Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3449 (GCVE-0-2021-3449)
Vulnerability from cvelistv5 – Published: 2021-03-25 14:25 – Updated: 2024-09-17 03:43- NULL pointer dereference
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:53:17.609Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.openssl.org/news/secadv/20210325.txt"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148"
},
{
"name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"name": "DSA-4875",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4875"
},
{
"name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
},
{
"name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
},
{
"name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
},
{
"name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
},
{
"name": "GLSA-202103-03",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"name": "FEDORA-2021-cbf14ab8f9",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-06"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"tags": [
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845"
},
{
"tags": [
"x_transferred"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013"
},
{
"name": "[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "OpenSSL",
"vendor": "OpenSSL",
"versions": [
{
"status": "affected",
"version": "Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j)"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Peter K\u00e4stle (Nokia) and Samuel Sapalski (Nokia)"
}
],
"datePublic": "2021-03-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j)."
}
],
"metrics": [
{
"other": {
"content": {
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#High",
"value": "High"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-21T19:05:57.096577",
"orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"shortName": "openssl"
},
"references": [
{
"url": "https://www.openssl.org/news/secadv/20210325.txt"
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148"
},
{
"name": "20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021",
"tags": [
"vendor-advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"name": "DSA-4875",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4875"
},
{
"name": "[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/27/1"
},
{
"name": "[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/27/2"
},
{
"name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/28/3"
},
{
"name": "[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2021/03/28/4"
},
{
"name": "GLSA-202103-03",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"name": "FEDORA-2021-cbf14ab8f9",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210326-0006/"
},
{
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"url": "https://www.tenable.com/security/tns-2021-06"
},
{
"url": "https://www.tenable.com/security/tns-2021-05"
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845"
},
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013"
},
{
"name": "[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "NULL pointer deref in signature_algorithms processing"
}
},
"cveMetadata": {
"assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"assignerShortName": "openssl",
"cveId": "CVE-2021-3449",
"datePublished": "2021-03-25T14:25:13.659307Z",
"dateReserved": "2021-03-17T00:00:00",
"dateUpdated": "2024-09-17T03:43:55.497Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.1.1\", \"versionEndExcluding\": \"1.1.1k\", \"matchCriteriaId\": \"B213E696-A6D9-45E7-B4E4-E4CFE54ECEB8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"73D9C08B-8F5B-40C4-A5BD-B00D2E4C012D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A178A3-6A52-4981-9A27-FB07AD8AF778\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"54A487B1-E5CE-4C76-87E8-518D24C5D86D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"280AA828-6FA9-4260-8EC1-019423B966E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24B8DB06-590A-4008-B0AB-FCD1401C77C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5735E553-9731-4AAC-BCFF-989377F817B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"361B791A-D336-4431-8F68-8135BEFFAEA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ADFF451-740F-4DBA-BD23-3881945D3E40\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9\", \"matchCriteriaId\": \"4ACF85D6-6B45-43DA-9C01-F0208186F014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.13.1\", \"matchCriteriaId\": \"0AC12300-9051-4C70-9941-9FE5E64B4B30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"657682A0-54D5-4DC6-A98E-8BAF685926C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FC5C76C-3474-4B26-8CF0-2DFAFA3D5458\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8661D361-71B5-4C41-A818-C89EC551D900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"253603DC-2D92-442A-B3A8-A63E14D8A070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E112CFF-31F9-4D87-9A1B-AE0FCF69615E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.13.0\", \"versionEndIncluding\": \"5.17.0\", \"matchCriteriaId\": \"AC1721B5-9FCD-47C3-8338-E02932CF2C05\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEA7F1FD-9FAB-4654-98B0-4588EEC8B69A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"868B2C4B-CE6B-41DA-A373-7D4FA51EFE9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"550F47A2-3393-481E-BC40-CE606BFA8776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43392D27-6C07-41C7-A17F-10C433338CE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FBF6C4C-195F-49A7-861D-52677D9BE58D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90732D53-E802-4E1B-B6C8-B1FDCE7905A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A98B128A-C58E-48EC-B691-AF73126A0822\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"345B990F-C1C4-440B-804E-0A2882FE7C01\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08601413-25E2-4977-B67A-C11A9D788EA8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFC067CC-EB90-43F5-9674-089D5C611573\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80B223A7-1039-445D-ABE1-5E481004D956\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1584E1B4-412C-40E2-BF07-4E464692F2AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0002A29-8B42-445D-9EC4-58BC93194241\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B0EDB21-9305-4601-AB96-A77BD00F311D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9016DDF6-285C-4E64-88D0-29ECCEF048F8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"570DB369-A31B-4108-A7FD-09F674129603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61516569-C48F-4362-B334-8CA10EDB0EC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"394A16F2-CCD4-44E5-BF6B-E0C782A9FA38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"058C7C4B-D692-49DE-924A-C2725A8162D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"0F0434A5-F2A1-4973-917C-A95F2ABE97D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"96DD93E0-274E-4C36-99F3-EEF085E57655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.2.6.0\", \"matchCriteriaId\": \"86305E47-33E9-411C-B932-08C395C09982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1CAD50-749F-4ADB-A046-BF3585677A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.0.23\", \"matchCriteriaId\": \"A8782A14-89B0-45EE-A5CB-FF715F5BA379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.7.33\", \"matchCriteriaId\": \"5C40ECC8-933B-47A4-8082-FCF0EF9C973E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.15\", \"versionEndIncluding\": \"8.0.23\", \"matchCriteriaId\": \"32714AD7-BCD1-4624-9923-5E6D927CF3CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.0.23\", \"matchCriteriaId\": \"CB1A94E1-A6C6-488D-A74C-6C0B24637272\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E1E416B-920B-49A0-9523-382898C2979D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.7\", \"versionEndIncluding\": \"17.12\", \"matchCriteriaId\": \"08FA59A8-6A62-4B33-8952-D6E658F8DAC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10864586-270E-4ACF-BDCC-ECFCD299305F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38340E3C-C452-4370-86D4-355B6B4E0A06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9C55C69-E22E-4B80-9371-5CD821D79FE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.1.0.1.0\", \"matchCriteriaId\": \"C01E8B82-71C7-4A4A-A70A-7B147524AB4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DA11710-9EA8-49B4-8FD1-3AEE442F6ADC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.2.0.0\", \"versionEndExcluding\": \"10.2.1.0-17sv\", \"matchCriteriaId\": \"6E8B6D50-D482-43E9-A20D-FA77FD59AE2D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E4A2B7B-40F5-4AE0-ACC7-E94B82435DBA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sonicwall:capture_client:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"349EB4AE-65E3-42DC-8F9C-3A1A155324D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sonicwall:sonicos:7.0.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BD8688A-2D55-4A7E-A143-1BD0FCF957B0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:ruggedcom_rcm1224_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"matchCriteriaId\": \"5081E52B-E7C0-46BD-B1D0-2C70ABCC8831\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:ruggedcom_rcm1224:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3747CDD7-E833-4B68-A362-77D6A2E9D888\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"058D21EA-E94C-4DDC-AD92-967DAC934457\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52A77C9D-E59C-4397-B834-797D7B334A6B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"matchCriteriaId\": \"424CD8EA-D8CB-40C7-8E0F-AC4B05C59C99\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB9921A-5204-40A3-88AB-B7755F5C6875\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.1\", \"matchCriteriaId\": \"858B6A84-5D0E-4E23-AE32-A45B51BAC8CF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4D89D82-C2CE-44DC-A05B-B956F20BF4E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.1\", \"matchCriteriaId\": \"D173626B-9C50-489F-8BA4-1C45E5F96526\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7B48D2-0D17-420D-AAE1-35E5C0BE2924\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"matchCriteriaId\": \"E967F5FC-6F3E-4982-8813-CA1DAF3BE165\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E917CBBB-EF41-4113-B0CA-EB91889235E7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.1\", \"matchCriteriaId\": \"81F315D8-0B26-4442-B330-85124017A482\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F80D9A79-7984-462B-B4B9-6A4429422038\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.1\", \"matchCriteriaId\": \"6F20F735-7A70-4A24-9621-786F99C8F87D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51B40F8-71D2-4D2D-8EC2-CE154A6D7533\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0\", \"matchCriteriaId\": \"973B8030-B630-4D67-B897-25A359A96185\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"725C671B-D7A0-48CF-8A31-5F9C4173F1DD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.5\", \"matchCriteriaId\": \"86EA8E3F-81BD-47BC-9834-A9B69CA7E70C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3033B1E-57A6-4AE3-A861-7047CF8EAD79\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_w1700_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0\", \"matchCriteriaId\": \"BE116AD9-B55F-41C8-8B55-329809DB63E1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_w1700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9A73DD-4A21-4096-B4B6-A0A825E71006\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3\", \"matchCriteriaId\": \"144CDF5E-7E07-428B-B4DF-C94992B3A44A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CB3CC2D-CBF0-4F53-A412-01BBC39E34C2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3\", \"matchCriteriaId\": \"339FFBDF-6957-481F-84CE-878B5CAAD9C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7719E194-EE3D-4CE8-8C85-CF0D82A553AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3\", \"matchCriteriaId\": \"6FBB13D3-4E04-4D01-B880-C16C4FFA240B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58377C58-F660-4C17-A3CB-BFC2F28848CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4\", \"matchCriteriaId\": \"E40058B3-3726-4F6A-AB41-7679487639F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"798E900F-5EF9-4B39-B8C2-79FAE659E7F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3\", \"matchCriteriaId\": \"1E642D10-E701-44DF-863B-D0DAA5530F50\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F962FC7-0616-467F-8CCA-ADEA224B5F7B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3\", \"matchCriteriaId\": \"4A53C2B5-A3FD-44CC-A78B-D2124EF37DB4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"434BC9BE-C5DB-4DAF-8E07-DFE4EEA0D7FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4\", \"matchCriteriaId\": \"54FBE4D4-F31E-4B61-9216-44C8EC2988AB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E6B7D8-3F9E-43D6-AEFE-DEE3993679C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4\", \"matchCriteriaId\": \"20511D61-FC1D-453E-BDF6-D3FB9951192A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67661569-6233-4C74-9C72-88BD14B257FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4\", \"matchCriteriaId\": \"640AC619-B516-46FC-821B-09C4542A3FD6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E048C4A-A414-4C87-A865-4D4218AE32EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.4\", \"matchCriteriaId\": \"1FB979DB-731B-4693-A9F8-B11ED953717C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09743616-31C9-4E47-8A4A-B15D76204BE7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.1\", \"matchCriteriaId\": \"886D2FE6-B054-4E3B-BACB-F08C0A119A80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B185B70-CAC9-47AC-8639-7A4707C21540\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cloud_connect_7:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA78457-260C-467B-9785-04B3C8EDF3B3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"matchCriteriaId\": \"ABEA3BEE-E7AF-4C9A-ADE4-CE7FC1DB7639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"049460B8-6186-44F9-B41F-284A2EC0B3B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"205482DA-548C-4757-91F0-1599438873BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_hmi_basic_panels_2nd_generation_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45208694-635A-42AC-B668-8B67C60568B8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_hmi_basic_panels_2nd_generation:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D8F8BCE-35CE-492A-8BFE-2C36EA51CE5C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4C147D9-4649-4289-B18B-55BD6E33521A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4830E0D-0128-4E5B-AB81-2B238471AE4B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54EFA8B5-8DA1-4547-9E15-BDC265C56006\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1CEB200-E38F-4629-9279-5AF065396678\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_mv500_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE4FA1E6-4C5A-4CDC-AD40-E384C0BCA90D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_mv500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93A5B50E-0316-4189-8F41-54732CFCF63F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"matchCriteriaId\": \"D254DA1D-C53E-426B-9C69-580CC47CF0AA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65278BA0-3C81-4D81-9801-D7BE3A1D7680\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"matchCriteriaId\": \"C06A02ED-0BA3-4A2C-AF0C-689B8AEB34B8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"209C7B1E-10F6-4215-AF69-CC36192E0FCE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_us_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"matchCriteriaId\": \"CF8C00EE-1154-440C-A223-A2CE99CE3126\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_us:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"171A9543-E677-422F-8AEA-1BC2D0E53593\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.1\", \"matchCriteriaId\": \"DB201DD3-8890-453E-A11E-1E13B3DAB3F9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"350FD323-C876-4C7A-A2E7-4B0660C87F6C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.1\", \"matchCriteriaId\": \"61E498B1-87FF-454B-8DF0-61D0D3208491\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1EE2F10-A7A6-486F-AE5C-53AE25BAF200\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.2\", \"versionEndExcluding\": \"3.0\", \"matchCriteriaId\": \"90FB801F-11B5-438C-98A1-E928BFEA2ADB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F56C2BDC-928E-491A-8E7C-F976B3787C7A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.1\", \"matchCriteriaId\": \"8E4BA1E6-64F7-4B96-8302-134057DAB1BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"783B50B8-2FB7-4982-88AA-B4F2AD094796\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"matchCriteriaId\": \"1DCA9544-DD17-4F56-B34C-91A3F37154AF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1256EB4B-DD8A-4F99-AE69-F74E8F789C63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_pcs_7_telecontrol_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C25165E-EDE9-42F1-A3B9-0E47630D49CC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_pcs_7_telecontrol:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BF281FB-26E0-43E4-A2B6-4015661368AC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_pcs_neo_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EEACFC9-41B7-4EE0-9427-692363880326\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_pcs_neo:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF3CA343-CA2A-4593-930C-158612CE7A55\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_pdm_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.1.0.7\", \"matchCriteriaId\": \"7E9AE23E-7DAE-4191-BA4E-A7CD655C4BC8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_pdm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E092B735-42D5-48D5-947B-288C0FA2E180\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2019\", \"matchCriteriaId\": \"D874D636-392A-4750-B976-F411DBCEBA8D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14EC9343-7778-40B0-A74D-5C156FF2A229\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf166c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968FBB4E-5B0B-43D4-B3AD-418028093990\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf166c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"391AD485-A49D-43D0-AAE5-1F58B38D4E22\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5212F097-B65A-4D73-BB6F-49687F8AD980\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf185c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82494B5E-80EE-47ED-B87E-CF8C8907B6FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D806113B-57EB-4AA0-9D5E-12E30337A93B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf186c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B0933EB-82BE-42BB-978B-C9EC2FE1C795\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53FA50A7-2DF6-454E-8A8E-838C392AB417\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EAEB335-BD22-4CEF-A3EA-9D98A09FEBF0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F3D41E9-58B3-4251-8710-A8C4A24ABBD3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf188c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E21F9909-8D80-40BE-81E0-6ED7FE140A3A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC628CB7-0816-4267-9C5D-954BD0233D2E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0927991-E820-4FC3-9EFE-96E4C9BFCCCD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_rf360r_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88E64167-16AA-48D7-BCDC-B15D37FA666D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_rf360r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63F05227-208B-42C8-8D56-A5D106CAD32F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47F1294A-1C26-4D43-9C53-D833F2510536\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3871C0C9-C65E-4E0B-9CA8-75E60066297F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AF60081-D534-44F5-972F-23257F16F372\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07849777-92E7-41D2-9128-F8D20DE15391\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEF1726E-B56F-4D39-AFF4-E79A3CA00DE6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68B3573B-A31E-4489-B2DD-B01B5C1D03CB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CC4A9F7-9858-4F95-8097-F8D09DA61314\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B640800C-9263-4BEA-9DA5-1323932540BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4948734A-0AAD-4D28-B7FF-FFBBB9AA39C6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE17584A-BF7A-48B8-A9CB-477663766C63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CC4A9F7-9858-4F95-8097-F8D09DA61314\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B640800C-9263-4BEA-9DA5-1323932540BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE37798-B068-40E5-BC03-1D8D303E5926\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C7D55C-8D99-4E2F-A254-1BDE2B12A203\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0C491C-5C4A-4F1C-ABD4-9502A54AAA78\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC4698CF-F935-4707-BA91-7E3650C7956C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7657063-1296-4734-B108-A2FF7A01B07F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"232279DE-CF1C-4A3C-886D-B4CE3F104F09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\\\/dp_mfp_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C477CCD-06C7-4907-8B0C-4FCE7F6DADAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\\\/dp_mfp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BC4FA01-8DDB-41E4-B759-7B504F78AEBC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:sinamics_connect_300_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3360ACCE-E735-4E34-B278-0D4460E74CBF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:sinamics_connect_300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B854F5B-78C7-41FE-9364-5E71B36342A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0\", \"versionEndExcluding\": \"2.2\", \"matchCriteriaId\": \"D2B20D95-C4B3-4D13-A3D8-F22AC42DC059\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1D94BEB-BBFB-4258-9835-87DBBB999239\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:simatic_logon:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6.0.2\", \"matchCriteriaId\": \"D6F24E40-F3F0-48F3-B3DC-5F98B0564F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:simatic_logon:1.5:sp3_update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"423359E5-9C36-4C6B-AB24-B030E6C61D53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79EE15DC-74D3-4551-AAD0-EA0CB600DA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:simatic_wincc_telecontrol:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3169FD3-CBA2-417C-95EF-4F8AE9FAB5AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_nms:1.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED13FC8-63C0-42C6-A51C-C480C45327C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_nms:1.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E68FE047-8F53-46B8-82D4-9342B1C8CA55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_pni:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1353DC31-FB12-427A-B1B2-9164A4BEE14B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A5CC25-A323-4D49-8989-5A417D12D646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A690BCD3-6497-43F7-8A51-E033B9121DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA375D44-ECC5-4BD3-A3D5-6D2AA68782D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CD26C73-B61F-424B-91C2-352E2CAE6666\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinema_server:14.0:sp2_update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB4EA15F-ECA4-477F-948F-490FC90BC66A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinumerik_opc_ua_server:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABA14E65-214C-431D-A49A-D8FC142D4541\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915B09CB-CA0A-445B-89D3-16AE9B08858E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.1\", \"matchCriteriaId\": \"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndIncluding\": \"10.12.0\", \"matchCriteriaId\": \"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"10.13.0\", \"versionEndIncluding\": \"10.24.0\", \"matchCriteriaId\": \"43B199B4-D89C-483D-ACAE-6CB2A59EE67C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndIncluding\": \"12.12.0\", \"matchCriteriaId\": \"564ED5C8-50D7-413A-B88E-E62B6C07336A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"12.13.0\", \"versionEndExcluding\": \"12.22.1\", \"matchCriteriaId\": \"3DEBF7C8-B000-47B9-B597-DC440F2603B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.14.0\", \"matchCriteriaId\": \"428DCD7B-6F66-4F18-B780-5BD80143D482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"14.15.0\", \"versionEndExcluding\": \"14.16.1\", \"matchCriteriaId\": \"380D03F3-6A7E-43A2-B002-FB2521FD3C58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"15.0.0\", \"versionEndExcluding\": \"15.14.0\", \"matchCriteriaId\": \"3ED4D313-F372-4CC1-BE11-6BBA2F0E90E3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\"}, {\"lang\": \"es\", \"value\": \"Un servidor OpenSSL TLS puede cometer un fallo si un cliente env\\u00eda un mensaje ClientHello de renegociaci\\u00f3n dise\\u00f1ado maliciosamente.\u0026#xa0;Si una renegociaci\\u00f3n de TLSv1.2 ClientHello omite la extensi\\u00f3n signature_algorithms (donde estaba presente en el ClientHello inicial), pero incluye una extensi\\u00f3n signature_algorithms_cert, se producir\\u00e1 una desreferencia del puntero NULL, lo que conllevar\\u00e1 un bloqueo y un ataque de denegaci\\u00f3n de servicio.\u0026#xa0;Un servidor solo es vulnerable si tiene TLSv1.2 y la renegociaci\\u00f3n habilitada (que es la configuraci\\u00f3n predeterminada).\u0026#xa0;Los clientes de OpenSSL TLS no est\\u00e1n afectados por este problema.\u0026#xa0;Todas las versiones de OpenSSL versi\\u00f3n 1.1.1 est\\u00e1n afectadas por este problema.\u0026#xa0;Los usuarios de estas versiones deben actualizar a OpenSSL versi\\u00f3n 1.1.1k.\u0026#xa0;OpenSSL versi\\u00f3n 1.0.2 no est\\u00e1 afectado por este problema.\u0026#xa0;Corregido en OpenSSL versi\\u00f3n 1.1.1k (Afectadas versiones 1.1.1-1.1.1j)\"}]",
"id": "CVE-2021-3449",
"lastModified": "2024-11-21T06:21:33.050",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-03-25T15:15:13.450",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/27/1\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/27/2\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/28/3\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/28/4\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202103-03\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210326-0006/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0002/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4875\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20210325.txt\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com//security-alerts/cpujul2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuApr2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-05\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-06\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-09\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-10\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/27/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/27/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/28/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/03/28/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202103-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210326-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4875\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20210325.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com//security-alerts/cpujul2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuApr2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-09\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "openssl-security@openssl.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-3449\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2021-03-25T15:15:13.450\",\"lastModified\":\"2024-11-21T06:21:33.050\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\"},{\"lang\":\"es\",\"value\":\"Un servidor OpenSSL TLS puede cometer un fallo si un cliente env\u00eda un mensaje ClientHello de renegociaci\u00f3n dise\u00f1ado maliciosamente.\u0026#xa0;Si una renegociaci\u00f3n de TLSv1.2 ClientHello omite la extensi\u00f3n signature_algorithms (donde estaba presente en el ClientHello inicial), pero incluye una extensi\u00f3n signature_algorithms_cert, se producir\u00e1 una desreferencia del puntero NULL, lo que conllevar\u00e1 un bloqueo y un ataque de denegaci\u00f3n de servicio.\u0026#xa0;Un servidor solo es vulnerable si tiene TLSv1.2 y la renegociaci\u00f3n habilitada (que es la configuraci\u00f3n predeterminada).\u0026#xa0;Los clientes de OpenSSL TLS no est\u00e1n afectados por este problema.\u0026#xa0;Todas las versiones de OpenSSL versi\u00f3n 1.1.1 est\u00e1n afectadas por este problema.\u0026#xa0;Los usuarios de estas versiones deben actualizar a OpenSSL versi\u00f3n 1.1.1k.\u0026#xa0;OpenSSL versi\u00f3n 1.0.2 no est\u00e1 afectado por este problema.\u0026#xa0;Corregido en OpenSSL versi\u00f3n 1.1.1k (Afectadas versiones 1.1.1-1.1.1j)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.1\",\"versionEndExcluding\":\"1.1.1k\",\"matchCriteriaId\":\"B213E696-A6D9-45E7-B4E4-E4CFE54ECEB8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D9C08B-8F5B-40C4-A5BD-B00D2E4C012D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A178A3-6A52-4981-9A27-FB07AD8AF778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"54A487B1-E5CE-4C76-87E8-518D24C5D86D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280AA828-6FA9-4260-8EC1-019423B966E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B8DB06-590A-4008-B0AB-FCD1401C77C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361B791A-D336-4431-8F68-8135BEFFAEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADFF451-740F-4DBA-BD23-3881945D3E40\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9\",\"matchCriteriaId\":\"4ACF85D6-6B45-43DA-9C01-F0208186F014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.13.1\",\"matchCriteriaId\":\"0AC12300-9051-4C70-9941-9FE5E64B4B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"657682A0-54D5-4DC6-A98E-8BAF685926C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC5C76C-3474-4B26-8CF0-2DFAFA3D5458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8661D361-71B5-4C41-A818-C89EC551D900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253603DC-2D92-442A-B3A8-A63E14D8A070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E112CFF-31F9-4D87-9A1B-AE0FCF69615E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13.0\",\"versionEndIncluding\":\"5.17.0\",\"matchCriteriaId\":\"AC1721B5-9FCD-47C3-8338-E02932CF2C05\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA7F1FD-9FAB-4654-98B0-4588EEC8B69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868B2C4B-CE6B-41DA-A373-7D4FA51EFE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550F47A2-3393-481E-BC40-CE606BFA8776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43392D27-6C07-41C7-A17F-10C433338CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FBF6C4C-195F-49A7-861D-52677D9BE58D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90732D53-E802-4E1B-B6C8-B1FDCE7905A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A98B128A-C58E-48EC-B691-AF73126A0822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345B990F-C1C4-440B-804E-0A2882FE7C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08601413-25E2-4977-B67A-C11A9D788EA8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC067CC-EB90-43F5-9674-089D5C611573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80B223A7-1039-445D-ABE1-5E481004D956\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1584E1B4-412C-40E2-BF07-4E464692F2AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0002A29-8B42-445D-9EC4-58BC93194241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B0EDB21-9305-4601-AB96-A77BD00F311D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9016DDF6-285C-4E64-88D0-29ECCEF048F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"570DB369-A31B-4108-A7FD-09F674129603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61516569-C48F-4362-B334-8CA10EDB0EC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"394A16F2-CCD4-44E5-BF6B-E0C782A9FA38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"058C7C4B-D692-49DE-924A-C2725A8162D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"0F0434A5-F2A1-4973-917C-A95F2ABE97D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"96DD93E0-274E-4C36-99F3-EEF085E57655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.2.6.0\",\"matchCriteriaId\":\"86305E47-33E9-411C-B932-08C395C09982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1CAD50-749F-4ADB-A046-BF3585677A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.23\",\"matchCriteriaId\":\"A8782A14-89B0-45EE-A5CB-FF715F5BA379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.7.33\",\"matchCriteriaId\":\"5C40ECC8-933B-47A4-8082-FCF0EF9C973E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.15\",\"versionEndIncluding\":\"8.0.23\",\"matchCriteriaId\":\"32714AD7-BCD1-4624-9923-5E6D927CF3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.23\",\"matchCriteriaId\":\"CB1A94E1-A6C6-488D-A74C-6C0B24637272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E416B-920B-49A0-9523-382898C2979D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.7\",\"versionEndIncluding\":\"17.12\",\"matchCriteriaId\":\"08FA59A8-6A62-4B33-8952-D6E658F8DAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10864586-270E-4ACF-BDCC-ECFCD299305F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38340E3C-C452-4370-86D4-355B6B4E0A06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C55C69-E22E-4B80-9371-5CD821D79FE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.1.0.1.0\",\"matchCriteriaId\":\"C01E8B82-71C7-4A4A-A70A-7B147524AB4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA11710-9EA8-49B4-8FD1-3AEE442F6ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.2.0.0\",\"versionEndExcluding\":\"10.2.1.0-17sv\",\"matchCriteriaId\":\"6E8B6D50-D482-43E9-A20D-FA77FD59AE2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4A2B7B-40F5-4AE0-ACC7-E94B82435DBA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:capture_client:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"349EB4AE-65E3-42DC-8F9C-3A1A155324D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:7.0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BD8688A-2D55-4A7E-A143-1BD0FCF957B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_rcm1224_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"matchCriteriaId\":\"5081E52B-E7C0-46BD-B1D0-2C70ABCC8831\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_rcm1224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3747CDD7-E833-4B68-A362-77D6A2E9D888\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"058D21EA-E94C-4DDC-AD92-967DAC934457\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52A77C9D-E59C-4397-B834-797D7B334A6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"matchCriteriaId\":\"424CD8EA-D8CB-40C7-8E0F-AC4B05C59C99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB9921A-5204-40A3-88AB-B7755F5C6875\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"matchCriteriaId\":\"858B6A84-5D0E-4E23-AE32-A45B51BAC8CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D89D82-C2CE-44DC-A05B-B956F20BF4E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"matchCriteriaId\":\"D173626B-9C50-489F-8BA4-1C45E5F96526\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7B48D2-0D17-420D-AAE1-35E5C0BE2924\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"matchCriteriaId\":\"E967F5FC-6F3E-4982-8813-CA1DAF3BE165\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E917CBBB-EF41-4113-B0CA-EB91889235E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"matchCriteriaId\":\"81F315D8-0B26-4442-B330-85124017A482\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80D9A79-7984-462B-B4B9-6A4429422038\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"matchCriteriaId\":\"6F20F735-7A70-4A24-9621-786F99C8F87D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51B40F8-71D2-4D2D-8EC2-CE154A6D7533\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0\",\"matchCriteriaId\":\"973B8030-B630-4D67-B897-25A359A96185\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725C671B-D7A0-48CF-8A31-5F9C4173F1DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5\",\"matchCriteriaId\":\"86EA8E3F-81BD-47BC-9834-A9B69CA7E70C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3033B1E-57A6-4AE3-A861-7047CF8EAD79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_w1700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0\",\"matchCriteriaId\":\"BE116AD9-B55F-41C8-8B55-329809DB63E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_w1700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9A73DD-4A21-4096-B4B6-A0A825E71006\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3\",\"matchCriteriaId\":\"144CDF5E-7E07-428B-B4DF-C94992B3A44A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB3CC2D-CBF0-4F53-A412-01BBC39E34C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3\",\"matchCriteriaId\":\"339FFBDF-6957-481F-84CE-878B5CAAD9C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7719E194-EE3D-4CE8-8C85-CF0D82A553AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3\",\"matchCriteriaId\":\"6FBB13D3-4E04-4D01-B880-C16C4FFA240B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58377C58-F660-4C17-A3CB-BFC2F28848CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4\",\"matchCriteriaId\":\"E40058B3-3726-4F6A-AB41-7679487639F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798E900F-5EF9-4B39-B8C2-79FAE659E7F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3\",\"matchCriteriaId\":\"1E642D10-E701-44DF-863B-D0DAA5530F50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F962FC7-0616-467F-8CCA-ADEA224B5F7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3\",\"matchCriteriaId\":\"4A53C2B5-A3FD-44CC-A78B-D2124EF37DB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"434BC9BE-C5DB-4DAF-8E07-DFE4EEA0D7FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4\",\"matchCriteriaId\":\"54FBE4D4-F31E-4B61-9216-44C8EC2988AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E6B7D8-3F9E-43D6-AEFE-DEE3993679C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4\",\"matchCriteriaId\":\"20511D61-FC1D-453E-BDF6-D3FB9951192A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67661569-6233-4C74-9C72-88BD14B257FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4\",\"matchCriteriaId\":\"640AC619-B516-46FC-821B-09C4542A3FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E048C4A-A414-4C87-A865-4D4218AE32EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.4\",\"matchCriteriaId\":\"1FB979DB-731B-4693-A9F8-B11ED953717C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09743616-31C9-4E47-8A4A-B15D76204BE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1\",\"matchCriteriaId\":\"886D2FE6-B054-4E3B-BACB-F08C0A119A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B185B70-CAC9-47AC-8639-7A4707C21540\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cloud_connect_7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA78457-260C-467B-9785-04B3C8EDF3B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"matchCriteriaId\":\"ABEA3BEE-E7AF-4C9A-ADE4-CE7FC1DB7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049460B8-6186-44F9-B41F-284A2EC0B3B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"205482DA-548C-4757-91F0-1599438873BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_hmi_basic_panels_2nd_generation_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45208694-635A-42AC-B668-8B67C60568B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_hmi_basic_panels_2nd_generation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8F8BCE-35CE-492A-8BFE-2C36EA51CE5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C147D9-4649-4289-B18B-55BD6E33521A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4830E0D-0128-4E5B-AB81-2B238471AE4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54EFA8B5-8DA1-4547-9E15-BDC265C56006\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1CEB200-E38F-4629-9279-5AF065396678\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_mv500_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4FA1E6-4C5A-4CDC-AD40-E384C0BCA90D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_mv500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A5B50E-0316-4189-8F41-54732CFCF63F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"matchCriteriaId\":\"D254DA1D-C53E-426B-9C69-580CC47CF0AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65278BA0-3C81-4D81-9801-D7BE3A1D7680\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"matchCriteriaId\":\"C06A02ED-0BA3-4A2C-AF0C-689B8AEB34B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209C7B1E-10F6-4215-AF69-CC36192E0FCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_us_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"matchCriteriaId\":\"CF8C00EE-1154-440C-A223-A2CE99CE3126\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171A9543-E677-422F-8AEA-1BC2D0E53593\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"matchCriteriaId\":\"DB201DD3-8890-453E-A11E-1E13B3DAB3F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"350FD323-C876-4C7A-A2E7-4B0660C87F6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1\",\"matchCriteriaId\":\"61E498B1-87FF-454B-8DF0-61D0D3208491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EE2F10-A7A6-486F-AE5C-53AE25BAF200\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2\",\"versionEndExcluding\":\"3.0\",\"matchCriteriaId\":\"90FB801F-11B5-438C-98A1-E928BFEA2ADB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F56C2BDC-928E-491A-8E7C-F976B3787C7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1\",\"matchCriteriaId\":\"8E4BA1E6-64F7-4B96-8302-134057DAB1BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783B50B8-2FB7-4982-88AA-B4F2AD094796\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"matchCriteriaId\":\"1DCA9544-DD17-4F56-B34C-91A3F37154AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1256EB4B-DD8A-4F99-AE69-F74E8F789C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_pcs_7_telecontrol_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C25165E-EDE9-42F1-A3B9-0E47630D49CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_pcs_7_telecontrol:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF281FB-26E0-43E4-A2B6-4015661368AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_pcs_neo_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EEACFC9-41B7-4EE0-9427-692363880326\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_pcs_neo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF3CA343-CA2A-4593-930C-158612CE7A55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_pdm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.1.0.7\",\"matchCriteriaId\":\"7E9AE23E-7DAE-4191-BA4E-A7CD655C4BC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_pdm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E092B735-42D5-48D5-947B-288C0FA2E180\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2019\",\"matchCriteriaId\":\"D874D636-392A-4750-B976-F411DBCEBA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14EC9343-7778-40B0-A74D-5C156FF2A229\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf166c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968FBB4E-5B0B-43D4-B3AD-418028093990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf166c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"391AD485-A49D-43D0-AAE5-1F58B38D4E22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5212F097-B65A-4D73-BB6F-49687F8AD980\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf185c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82494B5E-80EE-47ED-B87E-CF8C8907B6FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806113B-57EB-4AA0-9D5E-12E30337A93B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf186c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B0933EB-82BE-42BB-978B-C9EC2FE1C795\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53FA50A7-2DF6-454E-8A8E-838C392AB417\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAEB335-BD22-4CEF-A3EA-9D98A09FEBF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3D41E9-58B3-4251-8710-A8C4A24ABBD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf188c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E21F9909-8D80-40BE-81E0-6ED7FE140A3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC628CB7-0816-4267-9C5D-954BD0233D2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0927991-E820-4FC3-9EFE-96E4C9BFCCCD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf360r_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E64167-16AA-48D7-BCDC-B15D37FA666D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf360r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F05227-208B-42C8-8D56-A5D106CAD32F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F1294A-1C26-4D43-9C53-D833F2510536\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3871C0C9-C65E-4E0B-9CA8-75E60066297F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF60081-D534-44F5-972F-23257F16F372\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07849777-92E7-41D2-9128-F8D20DE15391\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF1726E-B56F-4D39-AFF4-E79A3CA00DE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B3573B-A31E-4489-B2DD-B01B5C1D03CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC4A9F7-9858-4F95-8097-F8D09DA61314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B640800C-9263-4BEA-9DA5-1323932540BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4948734A-0AAD-4D28-B7FF-FFBBB9AA39C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE17584A-BF7A-48B8-A9CB-477663766C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC4A9F7-9858-4F95-8097-F8D09DA61314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B640800C-9263-4BEA-9DA5-1323932540BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE37798-B068-40E5-BC03-1D8D303E5926\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C7D55C-8D99-4E2F-A254-1BDE2B12A203\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0C491C-5C4A-4F1C-ABD4-9502A54AAA78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC4698CF-F935-4707-BA91-7E3650C7956C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7657063-1296-4734-B108-A2FF7A01B07F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"232279DE-CF1C-4A3C-886D-B4CE3F104F09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\\\/dp_mfp_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C477CCD-06C7-4907-8B0C-4FCE7F6DADAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\\\/dp_mfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC4FA01-8DDB-41E4-B759-7B504F78AEBC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_connect_300_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3360ACCE-E735-4E34-B278-0D4460E74CBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinamics_connect_300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B854F5B-78C7-41FE-9364-5E71B36342A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0\",\"versionEndExcluding\":\"2.2\",\"matchCriteriaId\":\"D2B20D95-C4B3-4D13-A3D8-F22AC42DC059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D94BEB-BBFB-4258-9835-87DBBB999239\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_logon:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6.0.2\",\"matchCriteriaId\":\"D6F24E40-F3F0-48F3-B3DC-5F98B0564F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_logon:1.5:sp3_update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"423359E5-9C36-4C6B-AB24-B030E6C61D53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EE15DC-74D3-4551-AAD0-EA0CB600DA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_telecontrol:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3169FD3-CBA2-417C-95EF-4F8AE9FAB5AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_nms:1.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED13FC8-63C0-42C6-A51C-C480C45327C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_nms:1.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E68FE047-8F53-46B8-82D4-9342B1C8CA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_pni:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1353DC31-FB12-427A-B1B2-9164A4BEE14B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A5CC25-A323-4D49-8989-5A417D12D646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A690BCD3-6497-43F7-8A51-E033B9121DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA375D44-ECC5-4BD3-A3D5-6D2AA68782D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD26C73-B61F-424B-91C2-352E2CAE6666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinema_server:14.0:sp2_update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4EA15F-ECA4-477F-948F-490FC90BC66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinumerik_opc_ua_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABA14E65-214C-431D-A49A-D8FC142D4541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915B09CB-CA0A-445B-89D3-16AE9B08858E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndIncluding\":\"10.24.0\",\"matchCriteriaId\":\"43B199B4-D89C-483D-ACAE-6CB2A59EE67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.12.0\",\"matchCriteriaId\":\"564ED5C8-50D7-413A-B88E-E62B6C07336A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.13.0\",\"versionEndExcluding\":\"12.22.1\",\"matchCriteriaId\":\"3DEBF7C8-B000-47B9-B597-DC440F2603B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.14.0\",\"matchCriteriaId\":\"428DCD7B-6F66-4F18-B780-5BD80143D482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"14.15.0\",\"versionEndExcluding\":\"14.16.1\",\"matchCriteriaId\":\"380D03F3-6A7E-43A2-B002-FB2521FD3C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.14.0\",\"matchCriteriaId\":\"3ED4D313-F372-4CC1-BE11-6BBA2F0E90E3\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/27/1\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/27/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/28/3\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/28/4\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202103-03\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210326-0006/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0002/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4875\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20210325.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-05\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-06\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-09\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-10\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/27/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/27/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/28/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/28/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202103-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210326-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20210325.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
SUSE-SU-2021:2323-1
Vulnerability from csaf_suse - Published: 2021-07-14 15:04 - Updated: 2021-07-14 15:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs10",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs10 fixes the following issues:\n\nUpdate nodejs10 to 10.24.1.\n\nIncluding fixes for \n\n- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)\n- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)\n- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2323,SUSE-SLE-Module-Web-Scripting-12-2021-2323",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2323-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2323-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212323-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2323-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183155",
"url": "https://bugzilla.suse.com/1183155"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs10",
"tracking": {
"current_release_date": "2021-07-14T15:04:31Z",
"generator": {
"date": "2021-07-14T15:04:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2323-1",
"initial_release_date": "2021-07-14T15:04:31Z",
"revision_history": [
{
"date": "2021-07-14T15:04:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.aarch64",
"product": {
"name": "nodejs10-10.24.1-1.39.1.aarch64",
"product_id": "nodejs10-10.24.1-1.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.aarch64",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.aarch64",
"product_id": "nodejs10-devel-10.24.1-1.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.aarch64",
"product": {
"name": "npm10-10.24.1-1.39.1.aarch64",
"product_id": "npm10-10.24.1-1.39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.i586",
"product": {
"name": "nodejs10-10.24.1-1.39.1.i586",
"product_id": "nodejs10-10.24.1-1.39.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.i586",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.i586",
"product_id": "nodejs10-devel-10.24.1-1.39.1.i586"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.i586",
"product": {
"name": "npm10-10.24.1-1.39.1.i586",
"product_id": "npm10-10.24.1-1.39.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-docs-10.24.1-1.39.1.noarch",
"product": {
"name": "nodejs10-docs-10.24.1-1.39.1.noarch",
"product_id": "nodejs10-docs-10.24.1-1.39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.ppc64le",
"product": {
"name": "nodejs10-10.24.1-1.39.1.ppc64le",
"product_id": "nodejs10-10.24.1-1.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.ppc64le",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.ppc64le",
"product_id": "nodejs10-devel-10.24.1-1.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.ppc64le",
"product": {
"name": "npm10-10.24.1-1.39.1.ppc64le",
"product_id": "npm10-10.24.1-1.39.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.s390",
"product": {
"name": "nodejs10-10.24.1-1.39.1.s390",
"product_id": "nodejs10-10.24.1-1.39.1.s390"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.s390",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.s390",
"product_id": "nodejs10-devel-10.24.1-1.39.1.s390"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.s390",
"product": {
"name": "npm10-10.24.1-1.39.1.s390",
"product_id": "npm10-10.24.1-1.39.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.s390x",
"product": {
"name": "nodejs10-10.24.1-1.39.1.s390x",
"product_id": "nodejs10-10.24.1-1.39.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.s390x",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.s390x",
"product_id": "nodejs10-devel-10.24.1-1.39.1.s390x"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.s390x",
"product": {
"name": "npm10-10.24.1-1.39.1.s390x",
"product_id": "npm10-10.24.1-1.39.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.39.1.x86_64",
"product": {
"name": "nodejs10-10.24.1-1.39.1.x86_64",
"product_id": "nodejs10-10.24.1-1.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.39.1.x86_64",
"product": {
"name": "nodejs10-devel-10.24.1-1.39.1.x86_64",
"product_id": "nodejs10-devel-10.24.1-1.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.39.1.x86_64",
"product": {
"name": "npm10-10.24.1-1.39.1.x86_64",
"product_id": "npm10-10.24.1-1.39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.39.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.39.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.39.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.39.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.39.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x"
},
"product_reference": "npm10-10.24.1-1.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.24.1-1.39.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.24.1-1.39.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.24.1-1.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:04:31Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
SUSE-SU-2021:0955-1
Vulnerability from csaf_suse - Published: 2021-03-25 15:11 - Updated: 2021-03-25 15:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the security issue:\n\n* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted\n renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation\n ClientHello omits the signature_algorithms extension but includes a\n signature_algorithms_cert extension, then a NULL pointer dereference will\n result, leading to a crash and a denial of service attack. OpenSSL TLS\n clients are not impacted by this issue. [bsc#1183852]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-955,SUSE-SLE-Module-Basesystem-15-SP2-2021-955,SUSE-SLE-Module-Basesystem-15-SP3-2021-955,SUSE-SUSE-MicroOS-5.0-2021-955",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0955-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:0955-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210955-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:0955-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2021-03-25T15:11:58Z",
"generator": {
"date": "2021-03-25T15:11:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:0955-1",
"initial_release_date": "2021-03-25T15:11:58Z",
"revision_history": [
{
"date": "2021-03-25T15:11:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"product_id": "openssl-1_1-1.1.1d-11.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.i586",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.i586",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.i586",
"product_id": "openssl-1_1-1.1.1d-11.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1d-11.20.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1d-11.20.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1d-11.20.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"product_id": "openssl-1_1-1.1.1d-11.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.s390x",
"product_id": "openssl-1_1-1.1.1d-11.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"product_id": "openssl-1_1-1.1.1d-11.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-25T15:11:58Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
}
]
}
SUSE-SU-2021:2326-1
Vulnerability from csaf_suse - Published: 2021-07-14 15:07 - Updated: 2021-07-14 15:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs12 fixes the following issues:\n\n- update to 12.22.2:\n- CVE-2021-22918: Out of bounds read (bsc#1187973)\n- CVE-2021-23362: ssri Regular Expression Denial of Service and hosted-git-info (bsc#1187977)\n- CVE-2021-27290: Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n- CVE-2020-7774: npm - Update y18n to fix Prototype-Pollution (bsc#1184450)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2326,SUSE-SLE-Module-Web-Scripting-12-2021-2326",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2326-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2326-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212326-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2326-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs12",
"tracking": {
"current_release_date": "2021-07-14T15:07:58Z",
"generator": {
"date": "2021-07-14T15:07:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2326-1",
"initial_release_date": "2021-07-14T15:07:58Z",
"revision_history": [
{
"date": "2021-07-14T15:07:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-1.32.1.aarch64",
"product": {
"name": "nodejs12-12.22.2-1.32.1.aarch64",
"product_id": "nodejs12-12.22.2-1.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-1.32.1.aarch64",
"product": {
"name": "nodejs12-devel-12.22.2-1.32.1.aarch64",
"product_id": "nodejs12-devel-12.22.2-1.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-1.32.1.aarch64",
"product": {
"name": "npm12-12.22.2-1.32.1.aarch64",
"product_id": "npm12-12.22.2-1.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-1.32.1.i586",
"product": {
"name": "nodejs12-12.22.2-1.32.1.i586",
"product_id": "nodejs12-12.22.2-1.32.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-1.32.1.i586",
"product": {
"name": "nodejs12-devel-12.22.2-1.32.1.i586",
"product_id": "nodejs12-devel-12.22.2-1.32.1.i586"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-1.32.1.i586",
"product": {
"name": "npm12-12.22.2-1.32.1.i586",
"product_id": "npm12-12.22.2-1.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-docs-12.22.2-1.32.1.noarch",
"product": {
"name": "nodejs12-docs-12.22.2-1.32.1.noarch",
"product_id": "nodejs12-docs-12.22.2-1.32.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-1.32.1.ppc64le",
"product": {
"name": "nodejs12-12.22.2-1.32.1.ppc64le",
"product_id": "nodejs12-12.22.2-1.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-1.32.1.ppc64le",
"product": {
"name": "nodejs12-devel-12.22.2-1.32.1.ppc64le",
"product_id": "nodejs12-devel-12.22.2-1.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-1.32.1.ppc64le",
"product": {
"name": "npm12-12.22.2-1.32.1.ppc64le",
"product_id": "npm12-12.22.2-1.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-1.32.1.s390x",
"product": {
"name": "nodejs12-12.22.2-1.32.1.s390x",
"product_id": "nodejs12-12.22.2-1.32.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-1.32.1.s390x",
"product": {
"name": "nodejs12-devel-12.22.2-1.32.1.s390x",
"product_id": "nodejs12-devel-12.22.2-1.32.1.s390x"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-1.32.1.s390x",
"product": {
"name": "npm12-12.22.2-1.32.1.s390x",
"product_id": "npm12-12.22.2-1.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-1.32.1.x86_64",
"product": {
"name": "nodejs12-12.22.2-1.32.1.x86_64",
"product_id": "nodejs12-12.22.2-1.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-1.32.1.x86_64",
"product": {
"name": "nodejs12-devel-12.22.2-1.32.1.x86_64",
"product_id": "nodejs12-devel-12.22.2-1.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-1.32.1.x86_64",
"product": {
"name": "npm12-12.22.2-1.32.1.x86_64",
"product_id": "npm12-12.22.2-1.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-1.32.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64"
},
"product_reference": "nodejs12-12.22.2-1.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-1.32.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le"
},
"product_reference": "nodejs12-12.22.2-1.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-1.32.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x"
},
"product_reference": "nodejs12-12.22.2-1.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-1.32.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64"
},
"product_reference": "nodejs12-12.22.2-1.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-1.32.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64"
},
"product_reference": "nodejs12-devel-12.22.2-1.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-1.32.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le"
},
"product_reference": "nodejs12-devel-12.22.2-1.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-1.32.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x"
},
"product_reference": "nodejs12-devel-12.22.2-1.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-1.32.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64"
},
"product_reference": "nodejs12-devel-12.22.2-1.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-docs-12.22.2-1.32.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch"
},
"product_reference": "nodejs12-docs-12.22.2-1.32.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-1.32.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64"
},
"product_reference": "npm12-12.22.2-1.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-1.32.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le"
},
"product_reference": "npm12-12.22.2-1.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-1.32.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x"
},
"product_reference": "npm12-12.22.2-1.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-1.32.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
},
"product_reference": "npm12-12.22.2-1.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.2-1.32.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.2-1.32.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.2-1.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:07:58Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
SUSE-SU-2021:0955-2
Vulnerability from csaf_suse - Published: 2022-07-13 13:53 - Updated: 2022-07-13 13:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the security issue:\n\n* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted\n renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation\n ClientHello omits the signature_algorithms extension but includes a\n signature_algorithms_cert extension, then a NULL pointer dereference will\n result, leading to a crash and a denial of service attack. OpenSSL TLS\n clients are not impacted by this issue. [bsc#1183852]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-955,SUSE-SLE-Module-Certifications-15-SP3-2022-2389",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0955-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:0955-2",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210955-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:0955-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011541.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2022-07-13T13:53:46Z",
"generator": {
"date": "2022-07-13T13:53:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:0955-2",
"initial_release_date": "2022-07-13T13:53:46Z",
"revision_history": [
{
"date": "2022-07-13T13:53:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"product_id": "openssl-1_1-1.1.1d-11.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1d-11.20.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.i586",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.i586",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.i586",
"product_id": "openssl-1_1-1.1.1d-11.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1d-11.20.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1d-11.20.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1d-11.20.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"product_id": "openssl-1_1-1.1.1d-11.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.s390x",
"product_id": "openssl-1_1-1.1.1d-11.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"product_id": "openssl-1_1-1.1.1d-11.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Certifications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-certifications:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.aarch64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.ppc64le as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.s390x as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-11.20.1.x86_64 as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-11.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1d-11.20.1.noarch as component of SUSE Linux Enterprise Module for Certifications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-doc-1.1.1d-11.20.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1d-11.20.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Certifications 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-doc-1.1.1d-11.20.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-doc-1.1.1d-11.20.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.aarch64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.ppc64le",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.s390x",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-1.1.1d-11.20.1.x86_64",
"SUSE Linux Enterprise Module for Certifications 15 SP3:openssl-1_1-doc-1.1.1d-11.20.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T13:53:46Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
}
]
}
SUSE-SU-2021:2353-1
Vulnerability from csaf_suse - Published: 2021-07-15 13:18 - Updated: 2021-07-15 13:18Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs10",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs10 fixes the following issues:\n\nUpdate nodejs10 to 10.24.1.\n\nIncluding fixes for \n\n- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)\n- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)\n- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n- reduce memory footprint of test-worker-stdio (bsc#1183155)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2353,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-2353,SUSE-SLE-Product-HPC-15-2021-2353,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2353,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2353,SUSE-SLE-Product-SLES-15-2021-2353,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2353,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2353,SUSE-SLE-Product-SLES_SAP-15-2021-2353,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2353,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2353,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2353,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2353,SUSE-Storage-6-2021-2353",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2353-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2353-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212353-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2353-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183155",
"url": "https://bugzilla.suse.com/1183155"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs10",
"tracking": {
"current_release_date": "2021-07-15T13:18:32Z",
"generator": {
"date": "2021-07-15T13:18:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2353-1",
"initial_release_date": "2021-07-15T13:18:32Z",
"revision_history": [
{
"date": "2021-07-15T13:18:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.aarch64",
"product": {
"name": "nodejs10-10.24.1-1.36.1.aarch64",
"product_id": "nodejs10-10.24.1-1.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"product_id": "nodejs10-devel-10.24.1-1.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.aarch64",
"product": {
"name": "npm10-10.24.1-1.36.1.aarch64",
"product_id": "npm10-10.24.1-1.36.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.i586",
"product": {
"name": "nodejs10-10.24.1-1.36.1.i586",
"product_id": "nodejs10-10.24.1-1.36.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.i586",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.i586",
"product_id": "nodejs10-devel-10.24.1-1.36.1.i586"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.i586",
"product": {
"name": "npm10-10.24.1-1.36.1.i586",
"product_id": "npm10-10.24.1-1.36.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-docs-10.24.1-1.36.1.noarch",
"product": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch",
"product_id": "nodejs10-docs-10.24.1-1.36.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.ppc64le",
"product": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le",
"product_id": "nodejs10-10.24.1-1.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"product_id": "nodejs10-devel-10.24.1-1.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.ppc64le",
"product": {
"name": "npm10-10.24.1-1.36.1.ppc64le",
"product_id": "npm10-10.24.1-1.36.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.s390x",
"product": {
"name": "nodejs10-10.24.1-1.36.1.s390x",
"product_id": "nodejs10-10.24.1-1.36.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.s390x",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x",
"product_id": "nodejs10-devel-10.24.1-1.36.1.s390x"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.s390x",
"product": {
"name": "npm10-10.24.1-1.36.1.s390x",
"product_id": "npm10-10.24.1-1.36.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.x86_64",
"product": {
"name": "nodejs10-10.24.1-1.36.1.x86_64",
"product_id": "nodejs10-10.24.1-1.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"product_id": "nodejs10-devel-10.24.1-1.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.x86_64",
"product": {
"name": "npm10-10.24.1-1.36.1.x86_64",
"product_id": "npm10-10.24.1-1.36.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x"
},
"product_reference": "npm10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x"
},
"product_reference": "npm10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x"
},
"product_reference": "npm10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x"
},
"product_reference": "npm10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.aarch64",
"SUSE Enterprise Storage 6:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Proxy 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Proxy 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Retail Branch Server 4.0:npm10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:nodejs10-devel-10.24.1-1.36.1.x86_64",
"SUSE Manager Server 4.0:nodejs10-docs-10.24.1-1.36.1.noarch",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.ppc64le",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.s390x",
"SUSE Manager Server 4.0:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:32Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
SUSE-SU-2021:2327-1
Vulnerability from csaf_suse - Published: 2021-07-14 15:08 - Updated: 2021-07-14 15:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs12 fixes the following issues:\n\n- update to 12.22.2:\n- CVE-2021-22918: Out of bounds read (bsc#1187973)\n- CVE-2021-23362: ssri Regular Expression Denial of Service and hosted-git-info (bsc#1187977)\n- CVE-2021-27290: Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n- CVE-2020-7774: npm - Update y18n to fix Prototype-Pollution (bsc#1184450)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2327,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-2327,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-2327",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2327-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2327-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212327-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2327-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs12",
"tracking": {
"current_release_date": "2021-07-14T15:08:17Z",
"generator": {
"date": "2021-07-14T15:08:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2327-1",
"initial_release_date": "2021-07-14T15:08:17Z",
"revision_history": [
{
"date": "2021-07-14T15:08:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-4.16.1.aarch64",
"product": {
"name": "nodejs12-12.22.2-4.16.1.aarch64",
"product_id": "nodejs12-12.22.2-4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-4.16.1.aarch64",
"product": {
"name": "nodejs12-devel-12.22.2-4.16.1.aarch64",
"product_id": "nodejs12-devel-12.22.2-4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-4.16.1.aarch64",
"product": {
"name": "npm12-12.22.2-4.16.1.aarch64",
"product_id": "npm12-12.22.2-4.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-4.16.1.i586",
"product": {
"name": "nodejs12-12.22.2-4.16.1.i586",
"product_id": "nodejs12-12.22.2-4.16.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-4.16.1.i586",
"product": {
"name": "nodejs12-devel-12.22.2-4.16.1.i586",
"product_id": "nodejs12-devel-12.22.2-4.16.1.i586"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-4.16.1.i586",
"product": {
"name": "npm12-12.22.2-4.16.1.i586",
"product_id": "npm12-12.22.2-4.16.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-docs-12.22.2-4.16.1.noarch",
"product": {
"name": "nodejs12-docs-12.22.2-4.16.1.noarch",
"product_id": "nodejs12-docs-12.22.2-4.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-4.16.1.ppc64le",
"product": {
"name": "nodejs12-12.22.2-4.16.1.ppc64le",
"product_id": "nodejs12-12.22.2-4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-4.16.1.ppc64le",
"product": {
"name": "nodejs12-devel-12.22.2-4.16.1.ppc64le",
"product_id": "nodejs12-devel-12.22.2-4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-4.16.1.ppc64le",
"product": {
"name": "npm12-12.22.2-4.16.1.ppc64le",
"product_id": "npm12-12.22.2-4.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-4.16.1.s390x",
"product": {
"name": "nodejs12-12.22.2-4.16.1.s390x",
"product_id": "nodejs12-12.22.2-4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-4.16.1.s390x",
"product": {
"name": "nodejs12-devel-12.22.2-4.16.1.s390x",
"product_id": "nodejs12-devel-12.22.2-4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-4.16.1.s390x",
"product": {
"name": "npm12-12.22.2-4.16.1.s390x",
"product_id": "npm12-12.22.2-4.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs12-12.22.2-4.16.1.x86_64",
"product": {
"name": "nodejs12-12.22.2-4.16.1.x86_64",
"product_id": "nodejs12-12.22.2-4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs12-devel-12.22.2-4.16.1.x86_64",
"product": {
"name": "nodejs12-devel-12.22.2-4.16.1.x86_64",
"product_id": "nodejs12-devel-12.22.2-4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm12-12.22.2-4.16.1.x86_64",
"product": {
"name": "npm12-12.22.2-4.16.1.x86_64",
"product_id": "npm12-12.22.2-4.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64"
},
"product_reference": "nodejs12-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le"
},
"product_reference": "nodejs12-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x"
},
"product_reference": "nodejs12-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64"
},
"product_reference": "nodejs12-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-docs-12.22.2-4.16.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch"
},
"product_reference": "nodejs12-docs-12.22.2-4.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64"
},
"product_reference": "npm12-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le"
},
"product_reference": "npm12-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x"
},
"product_reference": "npm12-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64"
},
"product_reference": "npm12-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64"
},
"product_reference": "nodejs12-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le"
},
"product_reference": "nodejs12-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x"
},
"product_reference": "nodejs12-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64"
},
"product_reference": "nodejs12-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-devel-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64"
},
"product_reference": "nodejs12-devel-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs12-docs-12.22.2-4.16.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch"
},
"product_reference": "nodejs12-docs-12.22.2-4.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64"
},
"product_reference": "npm12-12.22.2-4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le"
},
"product_reference": "npm12-12.22.2-4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x"
},
"product_reference": "npm12-12.22.2-4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm12-12.22.2-4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
},
"product_reference": "npm12-12.22.2-4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.2-4.16.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.2-4.16.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.2-4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-14T15:08:17Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
SUSE-SU-2021:0954-1
Vulnerability from csaf_suse - Published: 2021-03-25 15:11 - Updated: 2021-03-25 15:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following security issue:\n\n* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted\n renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation\n ClientHello omits the signature_algorithms extension but includes a\n signature_algorithms_cert extension, then a NULL pointer dereference will\n result, leading to a crash and a denial of service attack. OpenSSL TLS\n clients are not impacted by this issue. [bsc#1183852]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-954,SUSE-OpenStack-Cloud-9-2021-954,SUSE-OpenStack-Cloud-Crowbar-9-2021-954,SUSE-SLE-SAP-12-SP4-2021-954,SUSE-SLE-SDK-12-SP5-2021-954,SUSE-SLE-SERVER-12-SP4-LTSS-2021-954,SUSE-SLE-SERVER-12-SP5-2021-954",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0954-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:0954-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210954-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:0954-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008558.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2021-03-25T15:11:37Z",
"generator": {
"date": "2021-03-25T15:11:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:0954-1",
"initial_release_date": "2021-03-25T15:11:37Z",
"revision_history": [
{
"date": "2021-03-25T15:11:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.aarch64",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.aarch64",
"product_id": "openssl-1_1-1.1.1d-2.33.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1d-2.33.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1d-2.33.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1d-2.33.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1d-2.33.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1d-2.33.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1d-2.33.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.i586",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.i586",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.i586",
"product_id": "openssl-1_1-1.1.1d-2.33.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1d-2.33.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1d-2.33.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1d-2.33.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"product_id": "openssl-1_1-1.1.1d-2.33.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.s390",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.s390",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.s390"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.s390",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.s390",
"product_id": "openssl-1_1-1.1.1d-2.33.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.s390x",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"product_id": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.s390x",
"product_id": "openssl-1_1-1.1.1d-2.33.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"product_id": "libopenssl1_1-1.1.1d-2.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"product_id": "openssl-1_1-1.1.1d-2.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.33.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.33.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-25T15:11:37Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-235
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable.sc versions ant\u00e9rieures \u00e0 5.18.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions ant\u00e9rieures \u00e0 8.13.2",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-235",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nTenable. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-06 du 01 avril 2021",
"url": "https://fr.tenable.com/security/tns-2021-06"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-05 du 01 avril 2021",
"url": "https://fr.tenable.com/security/tns-2021-05"
}
]
}
CERTFR-2021-AVI-221
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans OpenSSL. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenSSL version 1.1.1 ant\u00e9rieures \u00e0 1.1.1k",
"product": {
"name": "OpenSSL",
"vendor": {
"name": "OpenSSL",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-221",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-03-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans OpenSSL. Elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL 20210325 du 25 mars 2021",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-518
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMIT Simulation Platform toutes les versions | ||
| Siemens | N/A | JT Utilities toutes les versions antérieures à 13.0.2.0 | ||
| Siemens | N/A | SICAM 230 toutes les versions | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller, EK-ERTEC 200 ET EK-ERTEC 200P toutes les versions | ||
| Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) toutes les versions antérieures à 2.2 | ||
| Siemens | N/A | SINEC INS toutes les versions | ||
| Siemens | N/A | Les produits Teamcenter, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | Les produits SINAMICS, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SIMOCODE proV PROFINET toutes les versions antérieures à 2.1.3 | ||
| Siemens | N/A | SOFTNET-IE PNIO toutes les versions | ||
| Siemens | N/A | PSS CAPE Protection Simulation Platform:CAPE 14 installé avant le 16 juin | ||
| Siemens | N/A | SINEMA Server V14.0.2.x | ||
| Siemens | N/A | Les produits SINUMERIK, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | JT2Go toutes les versions antérieures à 13.2 | ||
| Siemens | N/A | Les produits Mendix, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SIMOCODE proV Ethernet/IP toutes les versions antérieures à 1.1.3 | ||
| Siemens | N/A | SINEC NMS:V1.0 SP1, V1.0 SP1 antérieures à version V1.0 SP2 | ||
| Siemens | N/A | Les produits SCALANCE, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | TIA Administrator toutes les versions | ||
| Siemens | N/A | RWG1.M12D toutes les versions | ||
| Siemens | N/A | Solid Edge SE2021 toutes les versions antérieures à SE2021MP5 | ||
| Siemens | N/A | RWG1.M12 toutes les versions | ||
| Siemens | N/A | Les produits SIMATIC, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | RWG1.M8 toutes les versions | ||
| Siemens | N/A | Les produits RUGGEDCOM, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SINEC PNI toutes les versions | ||
| Siemens | N/A | SINEMA Remote Connect Server toutes les versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMIT Simulation Platform toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT Utilities toutes les versions ant\u00e9rieures \u00e0 13.0.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM 230 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller, EK-ERTEC 200 ET EK-ERTEC 200P toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. SIPLUS NET variants) toutes les versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC INS toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits Teamcenter, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SINAMICS, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE proV PROFINET toutes les versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SOFTNET-IE PNIO toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS CAPE Protection Simulation Platform:CAPE 14 install\u00e9 avant le 16 juin",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14.0.2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SINUMERIK, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go toutes les versions ant\u00e9rieures \u00e0 13.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits Mendix, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE proV Ethernet/IP toutes les versions ant\u00e9rieures \u00e0 1.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS:V1.0 SP1, V1.0 SP1 ant\u00e9rieures \u00e0 version V1.0 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SCALANCE, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Administrator toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M12D toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2021 toutes les versions ant\u00e9rieures \u00e0 SE2021MP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M12 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SIMATIC, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M8 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits RUGGEDCOM, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC PNI toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Remote Connect Server toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34320",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34320"
},
{
"name": "CVE-2021-34300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34300"
},
{
"name": "CVE-2015-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8011"
},
{
"name": "CVE-2021-34331",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34331"
},
{
"name": "CVE-2021-34297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34297"
},
{
"name": "CVE-2021-31893",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31893"
},
{
"name": "CVE-2021-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34324"
},
{
"name": "CVE-2021-34316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34316"
},
{
"name": "CVE-2021-34292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34292"
},
{
"name": "CVE-2021-33713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33713"
},
{
"name": "CVE-2021-31892",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31892"
},
{
"name": "CVE-2021-34307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34307"
},
{
"name": "CVE-2021-34310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34310"
},
{
"name": "CVE-2021-34299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34299"
},
{
"name": "CVE-2021-33715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33715"
},
{
"name": "CVE-2021-34293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34293"
},
{
"name": "CVE-2021-34302",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34302"
},
{
"name": "CVE-2021-34309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34309"
},
{
"name": "CVE-2021-34301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34301"
},
{
"name": "CVE-2021-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34305"
},
{
"name": "CVE-2021-34313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34313"
},
{
"name": "CVE-2021-33718",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33718"
},
{
"name": "CVE-2021-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25671"
},
{
"name": "CVE-2021-29998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29998"
},
{
"name": "CVE-2021-34330",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34330"
},
{
"name": "CVE-2021-34319",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34319"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-31895",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31895"
},
{
"name": "CVE-2020-15782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15782"
},
{
"name": "CVE-2021-34333",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34333"
},
{
"name": "CVE-2021-34308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34308"
},
{
"name": "CVE-2021-34317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34317"
},
{
"name": "CVE-2021-34321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34321"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-34295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34295"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-34328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34328"
},
{
"name": "CVE-2021-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34326"
},
{
"name": "CVE-2021-34318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34318"
},
{
"name": "CVE-2021-34315",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34315"
},
{
"name": "CVE-2021-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34327"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-34322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34322"
},
{
"name": "CVE-2021-34304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34304"
},
{
"name": "CVE-2021-34314",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34314"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-34311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34311"
},
{
"name": "CVE-2021-33714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33714"
},
{
"name": "CVE-2021-34296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34296"
},
{
"name": "CVE-2021-31894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31894"
},
{
"name": "CVE-2021-33710",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33710"
},
{
"name": "CVE-2021-34312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34312"
},
{
"name": "CVE-2021-34329",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34329"
},
{
"name": "CVE-2021-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34303"
},
{
"name": "CVE-2021-34306",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34306"
},
{
"name": "CVE-2021-34298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34298"
},
{
"name": "CVE-2021-34291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34291"
},
{
"name": "CVE-2021-33709",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33709"
},
{
"name": "CVE-2021-34325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34325"
},
{
"name": "CVE-2021-34332",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34332"
},
{
"name": "CVE-2021-34323",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34323"
},
{
"name": "CVE-2021-34294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34294"
},
{
"name": "CVE-2021-33711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33711"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-518",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-641963 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-641963.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-729965 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-729965.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-560465 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-560465.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-434536 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-434536.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-209268 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-209268.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-173615 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-675303.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-434535 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-434535.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-622535 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622535.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-941426 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-661034 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-661034.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-373591 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-352521 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352521.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-483182 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf"
}
]
}
CERTFR-2021-AVI-784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données, un déni de service, une élévation de privilèges, une exécution de code à distance et une usurpation d'identité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 23 | ||
| Microsoft | N/A | System Center 2019 Operations Manager | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.1 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 21 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 11 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 22 | ||
| Microsoft | N/A | Intune management extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.0 | ||
| Microsoft | N/A | System Center 2016 Operations Manager | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 10 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | System Center 2012 R2 Operations Manager |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2013 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2019 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Intune management extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2016 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2012 R2 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-41355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41355"
},
{
"name": "CVE-2021-40474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40474"
},
{
"name": "CVE-2021-40479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40479"
},
{
"name": "CVE-2021-41354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41354"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34453"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-40485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40485"
},
{
"name": "CVE-2021-41348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41348"
},
{
"name": "CVE-2021-40472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40472"
},
{
"name": "CVE-2021-40473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40473"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-41363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41363"
},
{
"name": "CVE-2021-40481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40481"
},
{
"name": "CVE-2021-41352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41352"
},
{
"name": "CVE-2021-41353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41353"
},
{
"name": "CVE-2021-40480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40480"
},
{
"name": "CVE-2021-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40454"
},
{
"name": "CVE-2021-40457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40457"
},
{
"name": "CVE-2021-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26427"
},
{
"name": "CVE-2021-40471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40471"
},
{
"name": "CVE-2021-41350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41350"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la fonctionnalit\u00e9 de\ns\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de\nservice, une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de code \u00e0 distance\net une usurpation d\u0027identit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 octobre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2021-AVI-235
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable.sc versions ant\u00e9rieures \u00e0 5.18.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
},
{
"description": "Nessus versions ant\u00e9rieures \u00e0 8.13.2",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-235",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nTenable. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-06 du 01 avril 2021",
"url": "https://fr.tenable.com/security/tns-2021-06"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-05 du 01 avril 2021",
"url": "https://fr.tenable.com/security/tns-2021-05"
}
]
}
CERTFR-2021-AVI-341
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.0.0 à 2.7.9 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security version 4.2.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.0.0 à 3.7.19 antérieures à 3.7.20 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.0.0 à 4.1.5 antérieures à 4.1.6 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security SSOAgent versions 3.x antérieures à 3.0.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.0 à 3.11.7 antérieures à 3.11.8 | ||
| Stormshield | N/A | Netasq version 9.1.10 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.8.0 à 2.16.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 2.0.0 \u00e0 2.7.9",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security version 4.2.1",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.0.0 \u00e0 3.7.19 ant\u00e9rieures \u00e0 3.7.20",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.0.0 \u00e0 4.1.5 ant\u00e9rieures \u00e0 4.1.6",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security SSOAgent versions 3.x ant\u00e9rieures \u00e0 3.0.1",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.0 \u00e0 3.11.7 ant\u00e9rieures \u00e0 3.11.8",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq version 9.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.8.0 \u00e0 2.16.0",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2021-28665",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28665"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-341",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-05T00:00:00.000000"
},
{
"description": "coorection des identifiants de CVE",
"revision_date": "2021-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-014 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-014/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-018 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-018/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-010 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-010/"
}
]
}
CERTFR-2022-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Mendix Forgot Password Appstore module versions 3.2.x antérieures à 3.2.2
- Mendix Forgot Password Appstore module versions 3.3.x à 3.5.x antérieures à 3.5.1
- Mendix Applications utilisant Mendix versions 7.x antérieures à 7.23.29
- Mendix Applications utilisant Mendix versions 8.x antérieures à 8.18.16
- COMOS versions antérieures à 10.4.1
- Simcenter STAR-CCM+ Viewer versions antérieures à V2022.1
- SIMOTICS CONNECT 400 versions antérieures à 1.0.0.0
- Climatix POL909 (module AWB) versions antérieures à 11.44
- Climatix POL909 (module AWM) versions antérieures à 11.36
- RUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
- SINUMERIK MC versions antérieures à 1.15 SP1
- SINUMERIK ONE versions antérieures à 6.15 SP1
- SINEC INS versions antérieures à 1.0.1.1
- RUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions antérieures à 2.15.0
- Polarion Subversion Webclient versions antérieures à 21 R2 P2
- RUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
L'éditeur ne propose pas de correctif pour :
- Mendix Applications utilisant Mendix versions 9
- SINEC NMS toutes versions
Se référer aux mesures de contournement proposées dans la section Documentation.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.2.x ant\u00e9rieures \u00e0 3.2.2\u003c/li\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.3.x \u00e0 3.5.x ant\u00e9rieures \u00e0 3.5.1\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 7.x ant\u00e9rieures \u00e0 7.23.29\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 8.x ant\u00e9rieures \u00e0 8.18.16\u003c/li\u003e \u003cli\u003eCOMOS versions ant\u00e9rieures \u00e0 10.4.1\u003c/li\u003e \u003cli\u003eSimcenter STAR-CCM+ Viewer versions ant\u00e9rieures \u00e0 V2022.1\u003c/li\u003e \u003cli\u003eSIMOTICS CONNECT 400 versions ant\u00e9rieures \u00e0 1.0.0.0\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWB) versions ant\u00e9rieures \u00e0 11.44\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWM) versions ant\u00e9rieures \u00e0 11.36\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003cli\u003eSINUMERIK MC versions ant\u00e9rieures \u00e0 1.15 SP1\u003c/li\u003e \u003cli\u003eSINUMERIK ONE versions ant\u00e9rieures \u00e0 6.15 SP1\u003c/li\u003e \u003cli\u003eSINEC INS versions ant\u00e9rieures \u00e0 1.0.1.1\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions ant\u00e9rieures \u00e0 2.15.0\u003c/li\u003e \u003cli\u003ePolarion Subversion Webclient versions ant\u00e9rieures \u00e0 21 R2 P2\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour :\u003c/p\u003e \u003cul\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 9\u003c/li\u003e \u003cli\u003eSINEC NMS toutes versions\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux mesures de contournement propos\u00e9es dans la section Documentation.\u003c/p\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-44478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44478"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-42017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42017"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25174"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2021-32944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32944"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2021-42020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42020"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2021-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32936"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"name": "CVE-2021-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32946"
},
{
"name": "CVE-2021-41543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41543"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2021-40366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40366"
},
{
"name": "CVE-2021-41542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41542"
},
{
"name": "CVE-2021-41541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41541"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-24309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24309"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32938"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2022-26317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26317"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2021-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32940"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-37208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37208"
},
{
"name": "CVE-2021-32948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32948"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-26313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26313"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2021-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25216"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2021-25177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25177"
},
{
"name": "CVE-2021-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25175"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-32952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32952"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2018-7160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7160"
},
{
"name": "CVE-2021-32950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32950"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2021-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31346"
},
{
"name": "CVE-2022-26314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26314"
},
{
"name": "CVE-2021-31784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31784"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-31889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31889"
},
{
"name": "CVE-2022-24408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24408"
},
{
"name": "CVE-2021-42016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42016"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8287"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2022-24661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24661"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-42018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42018"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25176"
},
{
"name": "CVE-2021-31890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31890"
},
{
"name": "CVE-2021-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25178"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25173"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2021-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31344"
},
{
"name": "CVE-2021-37209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37209"
},
{
"name": "CVE-2021-42019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42019"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-216",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-166747 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-166747.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-252466 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-252466.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-562051 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-562051.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-223353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337210 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-337210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-148641 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-148641.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-389290 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-389290.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764417 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-764417.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-256353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-256353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-703715 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-703715.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-594438 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-594438.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-415938 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-415938.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-134279 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-134279.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-155599 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-155599.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-406691 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-406691.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2022-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Mendix Forgot Password Appstore module versions 3.2.x antérieures à 3.2.2
- Mendix Forgot Password Appstore module versions 3.3.x à 3.5.x antérieures à 3.5.1
- Mendix Applications utilisant Mendix versions 7.x antérieures à 7.23.29
- Mendix Applications utilisant Mendix versions 8.x antérieures à 8.18.16
- COMOS versions antérieures à 10.4.1
- Simcenter STAR-CCM+ Viewer versions antérieures à V2022.1
- SIMOTICS CONNECT 400 versions antérieures à 1.0.0.0
- Climatix POL909 (module AWB) versions antérieures à 11.44
- Climatix POL909 (module AWM) versions antérieures à 11.36
- RUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
- SINUMERIK MC versions antérieures à 1.15 SP1
- SINUMERIK ONE versions antérieures à 6.15 SP1
- SINEC INS versions antérieures à 1.0.1.1
- RUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions antérieures à 2.15.0
- Polarion Subversion Webclient versions antérieures à 21 R2 P2
- RUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
L'éditeur ne propose pas de correctif pour :
- Mendix Applications utilisant Mendix versions 9
- SINEC NMS toutes versions
Se référer aux mesures de contournement proposées dans la section Documentation.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.2.x ant\u00e9rieures \u00e0 3.2.2\u003c/li\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.3.x \u00e0 3.5.x ant\u00e9rieures \u00e0 3.5.1\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 7.x ant\u00e9rieures \u00e0 7.23.29\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 8.x ant\u00e9rieures \u00e0 8.18.16\u003c/li\u003e \u003cli\u003eCOMOS versions ant\u00e9rieures \u00e0 10.4.1\u003c/li\u003e \u003cli\u003eSimcenter STAR-CCM+ Viewer versions ant\u00e9rieures \u00e0 V2022.1\u003c/li\u003e \u003cli\u003eSIMOTICS CONNECT 400 versions ant\u00e9rieures \u00e0 1.0.0.0\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWB) versions ant\u00e9rieures \u00e0 11.44\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWM) versions ant\u00e9rieures \u00e0 11.36\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003cli\u003eSINUMERIK MC versions ant\u00e9rieures \u00e0 1.15 SP1\u003c/li\u003e \u003cli\u003eSINUMERIK ONE versions ant\u00e9rieures \u00e0 6.15 SP1\u003c/li\u003e \u003cli\u003eSINEC INS versions ant\u00e9rieures \u00e0 1.0.1.1\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions ant\u00e9rieures \u00e0 2.15.0\u003c/li\u003e \u003cli\u003ePolarion Subversion Webclient versions ant\u00e9rieures \u00e0 21 R2 P2\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour :\u003c/p\u003e \u003cul\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 9\u003c/li\u003e \u003cli\u003eSINEC NMS toutes versions\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux mesures de contournement propos\u00e9es dans la section Documentation.\u003c/p\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-44478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44478"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-42017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42017"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25174"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2021-32944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32944"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2021-42020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42020"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2021-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32936"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"name": "CVE-2021-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32946"
},
{
"name": "CVE-2021-41543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41543"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2021-40366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40366"
},
{
"name": "CVE-2021-41542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41542"
},
{
"name": "CVE-2021-41541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41541"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-24309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24309"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32938"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2022-26317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26317"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2021-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32940"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-37208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37208"
},
{
"name": "CVE-2021-32948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32948"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-26313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26313"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2021-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25216"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2021-25177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25177"
},
{
"name": "CVE-2021-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25175"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-32952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32952"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2018-7160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7160"
},
{
"name": "CVE-2021-32950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32950"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2021-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31346"
},
{
"name": "CVE-2022-26314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26314"
},
{
"name": "CVE-2021-31784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31784"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-31889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31889"
},
{
"name": "CVE-2022-24408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24408"
},
{
"name": "CVE-2021-42016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42016"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8287"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2022-24661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24661"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-42018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42018"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25176"
},
{
"name": "CVE-2021-31890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31890"
},
{
"name": "CVE-2021-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25178"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25173"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2021-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31344"
},
{
"name": "CVE-2021-37209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37209"
},
{
"name": "CVE-2021-42019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42019"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-216",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-166747 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-166747.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-252466 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-252466.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-562051 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-562051.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-223353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337210 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-337210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-148641 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-148641.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-389290 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-389290.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764417 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-764417.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-256353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-256353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-703715 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-703715.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-594438 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-594438.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-415938 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-415938.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-134279 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-134279.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-155599 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-155599.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-406691 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-406691.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
}
]
}
CERTFR-2021-AVI-395
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Spectrum Control. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions ant\u00e9rieures \u00e0 5.4.3",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27221"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-26296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26296"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-5258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5258"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-395",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Spectrum\nControl. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Spectrum Control",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6454803 du 20 mai 2021",
"url": "https://www.ibm.com/support/pages/node/6454803"
}
]
}
CERTFR-2021-AVI-430
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable LCE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable Log Correlation Engine versions ant\u00e9rieures \u00e0 6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-430",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable LCE. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable LCE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-10 du 01 juin 2021",
"url": "https://www.tenable.com/security/tns-2021-10"
}
]
}
CERTFR-2021-AVI-318
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Zimbra. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Zimbra versions ant\u00e9rieures \u00e0 8.8.15 P21",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Zimbra versions 9.0.x ant\u00e9rieures \u00e0 9.0.0 P14",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3341"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-3327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3327"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-318",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zimbra. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Zimbra",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zimbra du 26 avril 2021",
"url": "https://blog.zimbra.com/2021/04/new-zimbra-patches-9-0-0-patch-14-and-8-8-15-patch-21/"
}
]
}
CERTFR-2021-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Stormshield Endpoint Security. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | N/A | Stormshield Endpoint Security versions 7.2.x antérieures à 7.2.34 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Endpoint Security versions 7.2.x ant\u00e9rieures \u00e0 7.2.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-388",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Stormshield Endpoint Security.\nElle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Stormshield Endpoint Security",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-008 du 17 mai 2021",
"url": "https://advisories.stormshield.eu/2408/"
}
]
}
CERTFR-2021-AVI-296
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL versions ant\u00e9rieures \u00e0 5.7.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL versions ant\u00e9rieures \u00e0 8.0.24",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8277"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2020-17530",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17530"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-296",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021verbose.html#MSQL"
}
]
}
CERTFR-2021-AVI-415
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.2.1 antérieures à 4.2.2 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x.x antérieures à 3.7.20 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.1.5 antérieures à 4.1.6 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.x antérieures à 3.11.8 | ||
| Stormshield | N/A | Netasq versions 9.1.0 et 9.1.11 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 4.2.1 ant\u00e9rieures \u00e0 4.2.2",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.x.x ant\u00e9rieures \u00e0 3.7.20",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.1.5 ant\u00e9rieures \u00e0 4.1.6",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.x ant\u00e9rieures \u00e0 3.11.8",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.1.0 et 9.1.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1405"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1404"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-415",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-033 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-033/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-017 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-017/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-009 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-009/"
}
]
}
CERTFR-2021-AVI-540
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Capture Client versions Cc 3.5 ant\u00e9rieures \u00e0 CC 3.6.24",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SMA100 versions 10.2.0.x ant\u00e9rieures \u00e0 10.2.1.0-17sv",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SonicOS(Gen7) NSa, TZ versions 7.0.1 ant\u00e9rieures \u00e0 Gen7 7.0.1-R1456",
"product": {
"name": "SonicOS",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-540",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSonicWall. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SonicWall",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2021-0013 du 15 juillet 2021",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013"
}
]
}
CERTFR-2021-AVI-341
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.0.0 à 2.7.9 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security version 4.2.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.0.0 à 3.7.19 antérieures à 3.7.20 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.0.0 à 4.1.5 antérieures à 4.1.6 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security SSOAgent versions 3.x antérieures à 3.0.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.0 à 3.11.7 antérieures à 3.11.8 | ||
| Stormshield | N/A | Netasq version 9.1.10 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.8.0 à 2.16.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 2.0.0 \u00e0 2.7.9",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security version 4.2.1",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.0.0 \u00e0 3.7.19 ant\u00e9rieures \u00e0 3.7.20",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.0.0 \u00e0 4.1.5 ant\u00e9rieures \u00e0 4.1.6",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security SSOAgent versions 3.x ant\u00e9rieures \u00e0 3.0.1",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.0 \u00e0 3.11.7 ant\u00e9rieures \u00e0 3.11.8",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq version 9.1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.8.0 \u00e0 2.16.0",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2021-28665",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28665"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-341",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-05T00:00:00.000000"
},
{
"description": "coorection des identifiants de CVE",
"revision_date": "2021-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-014 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-014/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-018 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-018/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-010 du 5 mai 2021",
"url": "https://advisories.stormshield.eu/2021-010/"
}
]
}
CERTFR-2022-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Système affecté | Lien vers l'avis éditeur |
|---|---|
| Advantage Navigator Energy & Sustainability | Lien |
| Advantage Navigator Software Proxy V6 | Lien |
| Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
| Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
| Building Twin - 360° Viewer | Lien |
| Capital | Lien |
| Cerberus DMS | Lien |
| CloudConnect 712 | Lien |
| COMOS | Lien |
| COMOS V10.2 | Lien |
| COMOS V10.3 | Lien |
| COMOS V10.4 | Lien |
| cRSP Operator Client Starter | Lien |
| cRSP | Lien |
| Desigo CC | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| E-Car OC Cloud Application | Lien |
| Energy Engage | Lien |
| EnergyIP Prepay V3.7 | Lien |
| EnergyIP Prepay V3.8 | Lien |
| EnergyIP | Lien |
| Enlighted Amaze | Lien |
| Enlighted Where | Lien |
| Geolus Shape Search V10 | Lien |
| Geolus Shape Search V11 | Lien |
| GMA-Manager | Lien |
| HEEDS Connect | Lien |
| HES UDIS | Lien |
| IE/AS-i Link PN IO | Lien |
| IE/PB-Link (incl. SIPLUS NET variants) | Lien |
| IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
| Industrial Edge Hub | Lien |
| Industrial Edge Management App (IEM-App) | Lien |
| Industrial Edge Management OS (IEM-OS) | Lien |
| jROS for Spectrum Power 4 | Lien |
| jROS for Spectrum Power 7 | Lien |
| JT2Go | Lien |
| KTK ATE530S | Lien |
| LOGO! CMR2020 | Lien |
| LOGO! CMR2040 | Lien |
| Mendix Applications | Lien |
| MindSphere App Management Cockpits (Developer& Operator) | Lien |
| MindSphere Asset Manager | Lien |
| Mindsphere Cloud Foundry | Lien |
| Mindsphere Cloud Platform | Lien |
| MindSphere IAM (User Management/ Settings) | Lien |
| MindSphere Integrated Data Lake | Lien |
| MindSphere Notification Service | Lien |
| MindSphere Predictive Learning | Lien |
| MindSphere Usage Transparency Service | Lien |
| MindSphere Visual Explorer | Lien |
| NXpower Monitor | Lien |
| NX | Lien |
| Opcenter EX CP Process Automation Control | Lien |
| Opcenter Execution Core Process Automation Control | Lien |
| Opcenter Intelligence | Lien |
| Operation Scheduler | Lien |
| PROFINET Driver for Controller | Lien |
| PSS(R)CAPE | Lien |
| RFID 181EIP | Lien |
| ROX II | Lien |
| RUGGEDCOM APE1404 Linux | Lien |
| RUGGEDCOM CROSSBOW Station Access Controller | Lien |
| RUGGEDCOM RCM1224 | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM ROX MX5000RE | Lien |
| RUGGEDCOM ROX MX5000 | Lien |
| RUGGEDCOM ROX RX1400 | Lien |
| RUGGEDCOM ROX RX1500 | Lien |
| RUGGEDCOM ROX RX1501 | Lien |
| RUGGEDCOM ROX RX1510 | Lien |
| RUGGEDCOM ROX RX1511 | Lien |
| RUGGEDCOM ROX RX1512 | Lien |
| RUGGEDCOM ROX RX1524 | Lien |
| RUGGEDCOM ROX RX1536 | Lien |
| RUGGEDCOM ROX RX5000 | Lien |
| RUGGEDCOM RX1400 VPE Debian Linux | Lien |
| RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
| SCALANCE LPE9403 | Lien |
| SCALANCE M-800 / S615 | Lien |
| SCALANCE M-800 | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M875 | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W700 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE WAM763-1 | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WLC711 | Lien |
| SCALANCE WLC712 | Lien |
| SCALANCE WUM763-1 | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2 | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X206-1LD | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208 | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X302-7 EEC (230V coated) | Lien |
| SCALANCE X302-7 EEC (230V) | Lien |
| SCALANCE X302-7 EEC (24V coated) | Lien |
| SCALANCE X302-7 EEC (24V) | Lien |
| SCALANCE X302-7 EEC (2x 230V coated) | Lien |
| SCALANCE X302-7 EEC (2x 230V) | Lien |
| SCALANCE X302-7 EEC (2x 24V coated) | Lien |
| SCALANCE X302-7 EEC (2x 24V) | Lien |
| SCALANCE X302-7EEC | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X306-1LD FE | Lien |
| SCALANCE X306-1LDFE | Lien |
| SCALANCE X307-2 EEC (230V coated) | Lien |
| SCALANCE X307-2 EEC (230V) | Lien |
| SCALANCE X307-2 EEC (24V coated) | Lien |
| SCALANCE X307-2 EEC (24V) | Lien |
| SCALANCE X307-2 EEC (2x 230V coated) | Lien |
| SCALANCE X307-2 EEC (2x 230V) | Lien |
| SCALANCE X307-2 EEC (2x 24V coated) | Lien |
| SCALANCE X307-2 EEC (2x 24V) | Lien |
| SCALANCE X307-2EEC | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2 | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X320-1-2LD FE | Lien |
| SCALANCE X320-1 FE | Lien |
| SCALANCE X320-1FE | Lien |
| SCALANCE X320-3LDFE | Lien |
| SCALANCE X408-2 | Lien |
| SCALANCE X408 | Lien |
| SCALANCE X414 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE XF204-2 | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XM-400 Family | Lien |
| SCALANCE XM400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR324-12M (230V ports on front) | Lien |
| SCALANCE XR324-12M (230V ports on rear) | Lien |
| SCALANCE XR324-12M (24V ports on front) | Lien |
| SCALANCE XR324-12M (24V ports on rear) | Lien |
| SCALANCE XR324-12M | Lien |
| SCALANCE XR324-12M TS (24V) | Lien |
| SCALANCE XR324-12M TS | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC (24V ports on front) | Lien |
| SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC | Lien |
| SCALANCE XR324-4M PoE | Lien |
| SCALANCE XR324-4M PoE TS | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR500 | Lien |
| SCALANCE XR-500 | Lien |
| SENTRON 3VA COM100/800 | Lien |
| SENTRON 3VA DSP800 | Lien |
| SENTRON PAC2200 (with CLP Approval) | Lien |
| SENTRON PAC2200 (with MID Approval) | Lien |
| SENTRON PAC2200 (without MID Approval) | Lien |
| SENTRON PAC3200 | Lien |
| SENTRON PAC3200T | Lien |
| SENTRON PAC3220 | Lien |
| SENTRON PAC4200 | Lien |
| SENTRON powermanager V4 | Lien |
| SICAM 230 | Lien |
| SICAM TOOLBOX II | Lien |
| SIDOOR ATD430W | Lien |
| SIDOOR ATE530S COATED | Lien |
| SIDOOR ATE531S | Lien |
| SIGUARD DSA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC Cloud Connect 7 CC712 | Lien |
| SIMATIC Cloud Connect 7 CC716 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542SP-1 | Lien |
| SIMATIC Compact Field Unit | Lien |
| SIMATIC CP 1242-7C | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1616 and CP 1604 | Lien |
| SIMATIC CP1616/CP1604 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP1626 | Lien |
| SIMATIC CP 1626 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 ERPC | Lien |
| SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean | Lien |
| SIMATIC CP 343-1 | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC DK-16xx PN IO | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC ET200AL IM 157-1 PN | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200pro IM 154-3 PN HF | Lien |
| SIMATIC ET200pro IM 154-4 PN HF | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 MF HF | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC Field PG M5 | Lien |
| SIMATIC Field PG M6 | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC IE/PB-LINK V3 | Lien |
| SIMATIC Information Server | Lien |
| SIMATIC IPC1047E | Lien |
| SIMATIC IPC1047 | Lien |
| SIMATIC IPC127E | Lien |
| SIMATIC IPC427E | Lien |
| SIMATIC IPC477E Pro | Lien |
| SIMATIC IPC477E | Lien |
| SIMATIC IPC527G | Lien |
| SIMATIC IPC547G | Lien |
| SIMATIC IPC627E | Lien |
| SIMATIC IPC647D | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC677E | Lien |
| SIMATIC IPC847D | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC Support Package for VxWorks | Lien |
| SIMATIC ITC1500 PRO | Lien |
| SIMATIC ITC1500 | Lien |
| SIMATIC ITC1900 PRO | Lien |
| SIMATIC ITC1900 | Lien |
| SIMATIC ITC2200 PRO | Lien |
| SIMATIC ITC2200 | Lien |
| SIMATIC ITP1000 | Lien |
| SIMATIC Logon | Lien |
| SIMATIC MICRO-DRIVE PDC | Lien |
| SIMATIC MV400 family | Lien |
| SIMATIC MV400 | Lien |
| SIMATIC MV540 H (6GF3540-0GE10) | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 S (6GF3540-0CD10) | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV550 H (6GF3550-0GE10) | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 S (6GF3550-0CD10) | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV560 U (6GF3560-0LE10) | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 X (6GF3560-0HE10) | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC NET CP 1604 | Lien |
| SIMATIC NET CP 1616 | Lien |
| SIMATIC NET DK-16xx PN IO | Lien |
| SIMATIC NET PC Software | Lien |
| SIMATIC PCS 7 TeleControl | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PDM | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC Power Line Booster PLB Base Module | Lien |
| SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC RF166C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF360R | Lien |
| SIMATIC RF600 family | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600 | Lien |
| SIMATIC RF650R | Lien |
| SIMATIC RF680R | Lien |
| SIMATIC RF685R | Lien |
| SIMATIC RTU3010C | Lien |
| SIMATIC RTU3030C | Lien |
| SIMATIC RTU3031C | Lien |
| SIMATIC RTU3041C | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 Software Controller (incl. F) | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinCC OA | Lien |
| SIMATIC WinCC OA V3.17 | Lien |
| SIMATIC WinCC OA V3.18 | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC TeleControl | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.5 | Lien |
| SIMATIC WinCC V7.5 | Lien |
| Simcenter 3D | Lien |
| Simcenter Amesim | Lien |
| Simcenter Femap V2020.2 | Lien |
| Simcenter Femap V2021.1 | Lien |
| Simcenter System Architect | Lien |
| Simcenter System Simulation Client for Git | Lien |
| Simcenter Testlab Data Management | Lien |
| Simcenter Testlab | Lien |
| SIMIT Simulation Platform | Lien |
| SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
| SIMOCODE proV Ethernet/IP | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE proV PROFINET | Lien |
| SIMOTION C | Lien |
| SIMOTION C | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION P | Lien |
| SIMOTION P V4.4 and V4.5 | Lien |
| SIMOTION P V5 | Lien |
| SINAMICS Connect 300 | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS G110M V4.7 Control Unit | Lien |
| SINAMICS G110M V4.7 PN Control Unit | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G130 V4.6 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 SP1 Control Unit | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.8 Control Unit | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V5.1 Control Unit | Lien |
| SINAMICS G130 V5.1 SP1 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 V4.6 Control Unit | Lien |
| SINAMICS G150 V4.7 Control Unit | Lien |
| SINAMICS G150 V4.7 SP1 Control Unit | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.8 Control Unit | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V5.1 Control Unit | Lien |
| SINAMICS G150 V5.1 SP1 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 V4.6 Control Unit | Lien |
| SINAMICS S150 V4.7 Control Unit | Lien |
| SINAMICS S150 V4.7 SP1 Control Unit | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.8 Control Unit | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V5.1 Control Unit | Lien |
| SINAMICS S150 V5.1 SP1 Control Unit | Lien |
| SINAMICS S210 V5.1 Control Unit | Lien |
| SINAMICS S210 V5.1 SP1 Control Unit | Lien |
| SINAMICS S/G Control Unit w. PROFINET | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS V90 w. PN | Lien |
| SINAMICS V90 w. PN | Lien |
| SINEC INS | Lien |
| SINEC NMS | Lien |
| SINEC-NMS | Lien |
| SINEC NMS | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server V14 | Lien |
| SINUMERIK 808D | Lien |
| SINUMERIK 828D HW PU.4 | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D V4.5 and prior | Lien |
| SINUMERIK 828D V4.7 | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl V4.5 and prior | Lien |
| SINUMERIK 840D sl V4.7 | Lien |
| SINUMERIK MC MCU 1720 | Lien |
| SINUMERIK ONE NCU 1740 | Lien |
| SINUMERIK ONE PPU 1740 | Lien |
| SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK Operate | Lien |
| SiPass integrated V2.80 | Lien |
| SiPass integrated V2.85 | Lien |
| SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Lean | Lien |
| SIPLUS NET CP 343-1 | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIRIUS ACT 3SU1 interface module PROFINET | Lien |
| SIRIUS Motor Starter M200D PROFINET | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SITOP Manager | Lien |
| SITOP PSU8600 PROFINET | Lien |
| SITOP PSU8600 | Lien |
| SITOP UPS1600 (incl. SIPLUS variants) | Lien |
| SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
| Siveillance Command | Lien |
| Siveillance Control Pro | Lien |
| Siveillance Identity V1.5 | Lien |
| Siveillance Identity V1.6 | Lien |
| Siveillance Vantage | Lien |
| SOFTNET-IE PNIO | Lien |
| SOFTNET-IE PNIO | Lien |
| Softnet PROFINET IO for PC-based Windows systems | Lien |
| Solid Edge CAM Pro | Lien |
| Solid Edge Harness Design | Lien |
| Solid Edge SE2021 | Lien |
| Solid Edge SE2022 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 7 | Lien |
| SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
| Teamcenter Active Workspace | Lien |
| Teamcenter Briefcase Browser | Lien |
| Teamcenter Data Share Manager | Lien |
| Teamcenter Deployment Center | Lien |
| Teamcenter Dispatcher Service | Lien |
| Teamcenter EDA | Lien |
| Teamcenter FMS | Lien |
| Teamcenter Integration for CATIA | Lien |
| Teamcenter Integration Framework | Lien |
| Teamcenter MBSE Gateway | Lien |
| Teamcenter Mendix Connector | Lien |
| Teamcenter Microservices Framework | Lien |
| Teamcenter Polarion Integration | Lien |
| Teamcenter Rapid Start | Lien |
| Teamcenter Reporting and Analytics V11 | Lien |
| Teamcenter Reporting and Analytics V12.2 | Lien |
| Teamcenter Reporting and Analytics V12.3 | Lien |
| Teamcenter Reporting and Analytics V12.4 | Lien |
| Teamcenter Reporting and Analytics V13 | Lien |
| Teamcenter Retail Footwear and Apparel | Lien |
| Teamcenter Security Services | Lien |
| Teamcenter Supplier Collaboration | Lien |
| Teamcenter System Modeling Workbench | Lien |
| Teamcenter | Lien |
| Teamcenter Technical Publishing | Lien |
| Teamcenter Visualization V12.4 | Lien |
| Teamcenter Visualization V13.1 | Lien |
| Teamcenter Visualization V13.2 | Lien |
| Teamcenter Visualization V13.3 | Lien |
| Tecnomatix eBOP Manager Server | Lien |
| Tecnomatix Intosite | Lien |
| Tecnomatix Plant Simulation | Lien |
| Tecnomatix Process Designer | Lien |
| Tecnomatix Process Simulate | Lien |
| Tecnomatix Process Simulate VCLite | Lien |
| Tecnomatix RobotExpert | Lien |
| TeleControl Server Basic | Lien |
| TIA Administrator | Lien |
| TIA Administrator | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC | Lien |
| TIM 1531 IRC | Lien |
| TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
| Valor Parts Library - VPL Direct | Lien |
| Valor Parts Library - VPL Server or Service | Lien |
| VeSys | Lien |
| Xpedition Enterprise VX.2.10 | Lien |
| Xpedition Enterprise VX.2.6 | Lien |
| Xpedition Enterprise VX.2.7 | Lien |
| Xpedition Enterprise VX.2.8 | Lien |
| Xpedition Enterprise (XCR) VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.6 | Lien |
| Xpedition IC Packaging VX.2.7 | Lien |
| Xpedition IC Packaging VX.2.8 | Lien |
| Xpedition IC Packaging (XCR) VX.2.10 | Lien |
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40360"
},
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2021-37186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37186"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37198"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40363"
},
{
"name": "CVE-2021-46151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46151"
},
{
"name": "CVE-2021-44018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44018"
},
{
"name": "CVE-2022-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23312"
},
{
"name": "CVE-2021-41990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41990"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2021-46161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46161"
},
{
"name": "CVE-2021-41991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41991"
},
{
"name": "CVE-2021-46160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46160"
},
{
"name": "CVE-2022-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23102"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13933"
},
{
"name": "CVE-2019-8460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8460"
},
{
"name": "CVE-2019-6575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6575"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2019-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6568"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46156"
},
{
"name": "CVE-2021-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37197"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2021-37194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37194"
},
{
"name": "CVE-2021-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46153"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2021-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46152"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-37185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37185"
},
{
"name": "CVE-2021-46154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46154"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-37195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37195"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-46159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46159"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2021-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40358"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-44000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44000"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38405"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-46155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46155"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2021-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37196"
},
{
"name": "CVE-2021-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40364"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-37204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37204"
},
{
"name": "CVE-2019-19300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19300"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10942"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2017-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2681"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46158"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2021-46157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46157"
},
{
"name": "CVE-2021-45106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45106"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17437"
},
{
"name": "CVE-2021-44016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44016"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40359"
},
{
"name": "CVE-2021-37205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37205"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2019-19301",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19301"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
}
]
}
CERTFR-2021-AVI-518
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMIT Simulation Platform toutes les versions | ||
| Siemens | N/A | JT Utilities toutes les versions antérieures à 13.0.2.0 | ||
| Siemens | N/A | SICAM 230 toutes les versions | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller, EK-ERTEC 200 ET EK-ERTEC 200P toutes les versions | ||
| Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) toutes les versions antérieures à 2.2 | ||
| Siemens | N/A | SINEC INS toutes les versions | ||
| Siemens | N/A | Les produits Teamcenter, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | Les produits SINAMICS, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SIMOCODE proV PROFINET toutes les versions antérieures à 2.1.3 | ||
| Siemens | N/A | SOFTNET-IE PNIO toutes les versions | ||
| Siemens | N/A | PSS CAPE Protection Simulation Platform:CAPE 14 installé avant le 16 juin | ||
| Siemens | N/A | SINEMA Server V14.0.2.x | ||
| Siemens | N/A | Les produits SINUMERIK, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | JT2Go toutes les versions antérieures à 13.2 | ||
| Siemens | N/A | Les produits Mendix, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SIMOCODE proV Ethernet/IP toutes les versions antérieures à 1.1.3 | ||
| Siemens | N/A | SINEC NMS:V1.0 SP1, V1.0 SP1 antérieures à version V1.0 SP2 | ||
| Siemens | N/A | Les produits SCALANCE, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | TIA Administrator toutes les versions | ||
| Siemens | N/A | RWG1.M12D toutes les versions | ||
| Siemens | N/A | Solid Edge SE2021 toutes les versions antérieures à SE2021MP5 | ||
| Siemens | N/A | RWG1.M12 toutes les versions | ||
| Siemens | N/A | Les produits SIMATIC, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | RWG1.M8 toutes les versions | ||
| Siemens | N/A | Les produits RUGGEDCOM, pour plus d'informations veuillez-vous référer aux avis éditeurs | ||
| Siemens | N/A | SINEC PNI toutes les versions | ||
| Siemens | N/A | SINEMA Remote Connect Server toutes les versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMIT Simulation Platform toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT Utilities toutes les versions ant\u00e9rieures \u00e0 13.0.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM 230 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller, EK-ERTEC 200 ET EK-ERTEC 200P toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC (incl. SIPLUS NET variants) toutes les versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC INS toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits Teamcenter, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SINAMICS, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE proV PROFINET toutes les versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SOFTNET-IE PNIO toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PSS CAPE Protection Simulation Platform:CAPE 14 install\u00e9 avant le 16 juin",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14.0.2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SINUMERIK, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go toutes les versions ant\u00e9rieures \u00e0 13.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits Mendix, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE proV Ethernet/IP toutes les versions ant\u00e9rieures \u00e0 1.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS:V1.0 SP1, V1.0 SP1 ant\u00e9rieures \u00e0 version V1.0 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SCALANCE, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Administrator toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M12D toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2021 toutes les versions ant\u00e9rieures \u00e0 SE2021MP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M12 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits SIMATIC, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RWG1.M8 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les produits RUGGEDCOM, pour plus d\u0027informations veuillez-vous r\u00e9f\u00e9rer aux avis \u00e9diteurs",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC PNI toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Remote Connect Server toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34320",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34320"
},
{
"name": "CVE-2021-34300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34300"
},
{
"name": "CVE-2015-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8011"
},
{
"name": "CVE-2021-34331",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34331"
},
{
"name": "CVE-2021-34297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34297"
},
{
"name": "CVE-2021-31893",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31893"
},
{
"name": "CVE-2021-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34324"
},
{
"name": "CVE-2021-34316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34316"
},
{
"name": "CVE-2021-34292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34292"
},
{
"name": "CVE-2021-33713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33713"
},
{
"name": "CVE-2021-31892",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31892"
},
{
"name": "CVE-2021-34307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34307"
},
{
"name": "CVE-2021-34310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34310"
},
{
"name": "CVE-2021-34299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34299"
},
{
"name": "CVE-2021-33715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33715"
},
{
"name": "CVE-2021-34293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34293"
},
{
"name": "CVE-2021-34302",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34302"
},
{
"name": "CVE-2021-34309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34309"
},
{
"name": "CVE-2021-34301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34301"
},
{
"name": "CVE-2021-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34305"
},
{
"name": "CVE-2021-34313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34313"
},
{
"name": "CVE-2021-33718",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33718"
},
{
"name": "CVE-2021-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25671"
},
{
"name": "CVE-2021-29998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29998"
},
{
"name": "CVE-2021-34330",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34330"
},
{
"name": "CVE-2021-34319",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34319"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-31895",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31895"
},
{
"name": "CVE-2020-15782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15782"
},
{
"name": "CVE-2021-34333",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34333"
},
{
"name": "CVE-2021-34308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34308"
},
{
"name": "CVE-2021-34317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34317"
},
{
"name": "CVE-2021-34321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34321"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-34295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34295"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-34328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34328"
},
{
"name": "CVE-2021-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34326"
},
{
"name": "CVE-2021-34318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34318"
},
{
"name": "CVE-2021-34315",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34315"
},
{
"name": "CVE-2021-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34327"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-34322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34322"
},
{
"name": "CVE-2021-34304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34304"
},
{
"name": "CVE-2021-34314",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34314"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-34311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34311"
},
{
"name": "CVE-2021-33714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33714"
},
{
"name": "CVE-2021-34296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34296"
},
{
"name": "CVE-2021-31894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31894"
},
{
"name": "CVE-2021-33710",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33710"
},
{
"name": "CVE-2021-34312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34312"
},
{
"name": "CVE-2021-34329",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34329"
},
{
"name": "CVE-2021-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34303"
},
{
"name": "CVE-2021-34306",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34306"
},
{
"name": "CVE-2021-34298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34298"
},
{
"name": "CVE-2021-34291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34291"
},
{
"name": "CVE-2021-33709",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33709"
},
{
"name": "CVE-2021-34325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34325"
},
{
"name": "CVE-2021-34332",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34332"
},
{
"name": "CVE-2021-34323",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34323"
},
{
"name": "CVE-2021-34294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34294"
},
{
"name": "CVE-2021-33711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33711"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-518",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-641963 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-641963.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-729965 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-729965.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-560465 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-560465.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-434536 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-434536.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-209268 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-209268.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-173615 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-675303.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-434535 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-434535.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-622535 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622535.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-941426 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-661034 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-661034.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-373591 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-352521 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352521.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-483182 du 13 juillet 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf"
}
]
}
CERTFR-2021-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Stormshield Endpoint Security. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | N/A | Stormshield Endpoint Security versions 7.2.x antérieures à 7.2.34 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Endpoint Security versions 7.2.x ant\u00e9rieures \u00e0 7.2.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-388",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Stormshield Endpoint Security.\nElle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Stormshield Endpoint Security",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-008 du 17 mai 2021",
"url": "https://advisories.stormshield.eu/2408/"
}
]
}
CERTFR-2022-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Système affecté | Lien vers l'avis éditeur |
|---|---|
| Advantage Navigator Energy & Sustainability | Lien |
| Advantage Navigator Software Proxy V6 | Lien |
| Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
| Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
| Building Twin - 360° Viewer | Lien |
| Capital | Lien |
| Cerberus DMS | Lien |
| CloudConnect 712 | Lien |
| COMOS | Lien |
| COMOS V10.2 | Lien |
| COMOS V10.3 | Lien |
| COMOS V10.4 | Lien |
| cRSP Operator Client Starter | Lien |
| cRSP | Lien |
| Desigo CC | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| E-Car OC Cloud Application | Lien |
| Energy Engage | Lien |
| EnergyIP Prepay V3.7 | Lien |
| EnergyIP Prepay V3.8 | Lien |
| EnergyIP | Lien |
| Enlighted Amaze | Lien |
| Enlighted Where | Lien |
| Geolus Shape Search V10 | Lien |
| Geolus Shape Search V11 | Lien |
| GMA-Manager | Lien |
| HEEDS Connect | Lien |
| HES UDIS | Lien |
| IE/AS-i Link PN IO | Lien |
| IE/PB-Link (incl. SIPLUS NET variants) | Lien |
| IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
| Industrial Edge Hub | Lien |
| Industrial Edge Management App (IEM-App) | Lien |
| Industrial Edge Management OS (IEM-OS) | Lien |
| jROS for Spectrum Power 4 | Lien |
| jROS for Spectrum Power 7 | Lien |
| JT2Go | Lien |
| KTK ATE530S | Lien |
| LOGO! CMR2020 | Lien |
| LOGO! CMR2040 | Lien |
| Mendix Applications | Lien |
| MindSphere App Management Cockpits (Developer& Operator) | Lien |
| MindSphere Asset Manager | Lien |
| Mindsphere Cloud Foundry | Lien |
| Mindsphere Cloud Platform | Lien |
| MindSphere IAM (User Management/ Settings) | Lien |
| MindSphere Integrated Data Lake | Lien |
| MindSphere Notification Service | Lien |
| MindSphere Predictive Learning | Lien |
| MindSphere Usage Transparency Service | Lien |
| MindSphere Visual Explorer | Lien |
| NXpower Monitor | Lien |
| NX | Lien |
| Opcenter EX CP Process Automation Control | Lien |
| Opcenter Execution Core Process Automation Control | Lien |
| Opcenter Intelligence | Lien |
| Operation Scheduler | Lien |
| PROFINET Driver for Controller | Lien |
| PSS(R)CAPE | Lien |
| RFID 181EIP | Lien |
| ROX II | Lien |
| RUGGEDCOM APE1404 Linux | Lien |
| RUGGEDCOM CROSSBOW Station Access Controller | Lien |
| RUGGEDCOM RCM1224 | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM ROX MX5000RE | Lien |
| RUGGEDCOM ROX MX5000 | Lien |
| RUGGEDCOM ROX RX1400 | Lien |
| RUGGEDCOM ROX RX1500 | Lien |
| RUGGEDCOM ROX RX1501 | Lien |
| RUGGEDCOM ROX RX1510 | Lien |
| RUGGEDCOM ROX RX1511 | Lien |
| RUGGEDCOM ROX RX1512 | Lien |
| RUGGEDCOM ROX RX1524 | Lien |
| RUGGEDCOM ROX RX1536 | Lien |
| RUGGEDCOM ROX RX5000 | Lien |
| RUGGEDCOM RX1400 VPE Debian Linux | Lien |
| RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
| SCALANCE LPE9403 | Lien |
| SCALANCE M-800 / S615 | Lien |
| SCALANCE M-800 | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M875 | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W700 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE WAM763-1 | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WLC711 | Lien |
| SCALANCE WLC712 | Lien |
| SCALANCE WUM763-1 | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2 | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X206-1LD | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208 | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X302-7 EEC (230V coated) | Lien |
| SCALANCE X302-7 EEC (230V) | Lien |
| SCALANCE X302-7 EEC (24V coated) | Lien |
| SCALANCE X302-7 EEC (24V) | Lien |
| SCALANCE X302-7 EEC (2x 230V coated) | Lien |
| SCALANCE X302-7 EEC (2x 230V) | Lien |
| SCALANCE X302-7 EEC (2x 24V coated) | Lien |
| SCALANCE X302-7 EEC (2x 24V) | Lien |
| SCALANCE X302-7EEC | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X306-1LD FE | Lien |
| SCALANCE X306-1LDFE | Lien |
| SCALANCE X307-2 EEC (230V coated) | Lien |
| SCALANCE X307-2 EEC (230V) | Lien |
| SCALANCE X307-2 EEC (24V coated) | Lien |
| SCALANCE X307-2 EEC (24V) | Lien |
| SCALANCE X307-2 EEC (2x 230V coated) | Lien |
| SCALANCE X307-2 EEC (2x 230V) | Lien |
| SCALANCE X307-2 EEC (2x 24V coated) | Lien |
| SCALANCE X307-2 EEC (2x 24V) | Lien |
| SCALANCE X307-2EEC | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2 | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X320-1-2LD FE | Lien |
| SCALANCE X320-1 FE | Lien |
| SCALANCE X320-1FE | Lien |
| SCALANCE X320-3LDFE | Lien |
| SCALANCE X408-2 | Lien |
| SCALANCE X408 | Lien |
| SCALANCE X414 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE XF204-2 | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XM-400 Family | Lien |
| SCALANCE XM400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR324-12M (230V ports on front) | Lien |
| SCALANCE XR324-12M (230V ports on rear) | Lien |
| SCALANCE XR324-12M (24V ports on front) | Lien |
| SCALANCE XR324-12M (24V ports on rear) | Lien |
| SCALANCE XR324-12M | Lien |
| SCALANCE XR324-12M TS (24V) | Lien |
| SCALANCE XR324-12M TS | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC (24V ports on front) | Lien |
| SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC | Lien |
| SCALANCE XR324-4M PoE | Lien |
| SCALANCE XR324-4M PoE TS | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR500 | Lien |
| SCALANCE XR-500 | Lien |
| SENTRON 3VA COM100/800 | Lien |
| SENTRON 3VA DSP800 | Lien |
| SENTRON PAC2200 (with CLP Approval) | Lien |
| SENTRON PAC2200 (with MID Approval) | Lien |
| SENTRON PAC2200 (without MID Approval) | Lien |
| SENTRON PAC3200 | Lien |
| SENTRON PAC3200T | Lien |
| SENTRON PAC3220 | Lien |
| SENTRON PAC4200 | Lien |
| SENTRON powermanager V4 | Lien |
| SICAM 230 | Lien |
| SICAM TOOLBOX II | Lien |
| SIDOOR ATD430W | Lien |
| SIDOOR ATE530S COATED | Lien |
| SIDOOR ATE531S | Lien |
| SIGUARD DSA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC Cloud Connect 7 CC712 | Lien |
| SIMATIC Cloud Connect 7 CC716 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542SP-1 | Lien |
| SIMATIC Compact Field Unit | Lien |
| SIMATIC CP 1242-7C | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1616 and CP 1604 | Lien |
| SIMATIC CP1616/CP1604 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP1626 | Lien |
| SIMATIC CP 1626 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 ERPC | Lien |
| SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean | Lien |
| SIMATIC CP 343-1 | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC DK-16xx PN IO | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC ET200AL IM 157-1 PN | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200pro IM 154-3 PN HF | Lien |
| SIMATIC ET200pro IM 154-4 PN HF | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 MF HF | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC Field PG M5 | Lien |
| SIMATIC Field PG M6 | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC IE/PB-LINK V3 | Lien |
| SIMATIC Information Server | Lien |
| SIMATIC IPC1047E | Lien |
| SIMATIC IPC1047 | Lien |
| SIMATIC IPC127E | Lien |
| SIMATIC IPC427E | Lien |
| SIMATIC IPC477E Pro | Lien |
| SIMATIC IPC477E | Lien |
| SIMATIC IPC527G | Lien |
| SIMATIC IPC547G | Lien |
| SIMATIC IPC627E | Lien |
| SIMATIC IPC647D | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC677E | Lien |
| SIMATIC IPC847D | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC Support Package for VxWorks | Lien |
| SIMATIC ITC1500 PRO | Lien |
| SIMATIC ITC1500 | Lien |
| SIMATIC ITC1900 PRO | Lien |
| SIMATIC ITC1900 | Lien |
| SIMATIC ITC2200 PRO | Lien |
| SIMATIC ITC2200 | Lien |
| SIMATIC ITP1000 | Lien |
| SIMATIC Logon | Lien |
| SIMATIC MICRO-DRIVE PDC | Lien |
| SIMATIC MV400 family | Lien |
| SIMATIC MV400 | Lien |
| SIMATIC MV540 H (6GF3540-0GE10) | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 S (6GF3540-0CD10) | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV550 H (6GF3550-0GE10) | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 S (6GF3550-0CD10) | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV560 U (6GF3560-0LE10) | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 X (6GF3560-0HE10) | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC NET CP 1604 | Lien |
| SIMATIC NET CP 1616 | Lien |
| SIMATIC NET DK-16xx PN IO | Lien |
| SIMATIC NET PC Software | Lien |
| SIMATIC PCS 7 TeleControl | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PDM | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC Power Line Booster PLB Base Module | Lien |
| SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC RF166C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF360R | Lien |
| SIMATIC RF600 family | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600 | Lien |
| SIMATIC RF650R | Lien |
| SIMATIC RF680R | Lien |
| SIMATIC RF685R | Lien |
| SIMATIC RTU3010C | Lien |
| SIMATIC RTU3030C | Lien |
| SIMATIC RTU3031C | Lien |
| SIMATIC RTU3041C | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 Software Controller (incl. F) | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinCC OA | Lien |
| SIMATIC WinCC OA V3.17 | Lien |
| SIMATIC WinCC OA V3.18 | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC TeleControl | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.5 | Lien |
| SIMATIC WinCC V7.5 | Lien |
| Simcenter 3D | Lien |
| Simcenter Amesim | Lien |
| Simcenter Femap V2020.2 | Lien |
| Simcenter Femap V2021.1 | Lien |
| Simcenter System Architect | Lien |
| Simcenter System Simulation Client for Git | Lien |
| Simcenter Testlab Data Management | Lien |
| Simcenter Testlab | Lien |
| SIMIT Simulation Platform | Lien |
| SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
| SIMOCODE proV Ethernet/IP | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE proV PROFINET | Lien |
| SIMOTION C | Lien |
| SIMOTION C | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION P | Lien |
| SIMOTION P V4.4 and V4.5 | Lien |
| SIMOTION P V5 | Lien |
| SINAMICS Connect 300 | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS G110M V4.7 Control Unit | Lien |
| SINAMICS G110M V4.7 PN Control Unit | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G130 V4.6 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 SP1 Control Unit | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.8 Control Unit | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V5.1 Control Unit | Lien |
| SINAMICS G130 V5.1 SP1 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 V4.6 Control Unit | Lien |
| SINAMICS G150 V4.7 Control Unit | Lien |
| SINAMICS G150 V4.7 SP1 Control Unit | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.8 Control Unit | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V5.1 Control Unit | Lien |
| SINAMICS G150 V5.1 SP1 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 V4.6 Control Unit | Lien |
| SINAMICS S150 V4.7 Control Unit | Lien |
| SINAMICS S150 V4.7 SP1 Control Unit | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.8 Control Unit | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V5.1 Control Unit | Lien |
| SINAMICS S150 V5.1 SP1 Control Unit | Lien |
| SINAMICS S210 V5.1 Control Unit | Lien |
| SINAMICS S210 V5.1 SP1 Control Unit | Lien |
| SINAMICS S/G Control Unit w. PROFINET | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS V90 w. PN | Lien |
| SINAMICS V90 w. PN | Lien |
| SINEC INS | Lien |
| SINEC NMS | Lien |
| SINEC-NMS | Lien |
| SINEC NMS | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server V14 | Lien |
| SINUMERIK 808D | Lien |
| SINUMERIK 828D HW PU.4 | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D V4.5 and prior | Lien |
| SINUMERIK 828D V4.7 | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl V4.5 and prior | Lien |
| SINUMERIK 840D sl V4.7 | Lien |
| SINUMERIK MC MCU 1720 | Lien |
| SINUMERIK ONE NCU 1740 | Lien |
| SINUMERIK ONE PPU 1740 | Lien |
| SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK Operate | Lien |
| SiPass integrated V2.80 | Lien |
| SiPass integrated V2.85 | Lien |
| SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Lean | Lien |
| SIPLUS NET CP 343-1 | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIRIUS ACT 3SU1 interface module PROFINET | Lien |
| SIRIUS Motor Starter M200D PROFINET | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SITOP Manager | Lien |
| SITOP PSU8600 PROFINET | Lien |
| SITOP PSU8600 | Lien |
| SITOP UPS1600 (incl. SIPLUS variants) | Lien |
| SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
| Siveillance Command | Lien |
| Siveillance Control Pro | Lien |
| Siveillance Identity V1.5 | Lien |
| Siveillance Identity V1.6 | Lien |
| Siveillance Vantage | Lien |
| SOFTNET-IE PNIO | Lien |
| SOFTNET-IE PNIO | Lien |
| Softnet PROFINET IO for PC-based Windows systems | Lien |
| Solid Edge CAM Pro | Lien |
| Solid Edge Harness Design | Lien |
| Solid Edge SE2021 | Lien |
| Solid Edge SE2022 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 7 | Lien |
| SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
| Teamcenter Active Workspace | Lien |
| Teamcenter Briefcase Browser | Lien |
| Teamcenter Data Share Manager | Lien |
| Teamcenter Deployment Center | Lien |
| Teamcenter Dispatcher Service | Lien |
| Teamcenter EDA | Lien |
| Teamcenter FMS | Lien |
| Teamcenter Integration for CATIA | Lien |
| Teamcenter Integration Framework | Lien |
| Teamcenter MBSE Gateway | Lien |
| Teamcenter Mendix Connector | Lien |
| Teamcenter Microservices Framework | Lien |
| Teamcenter Polarion Integration | Lien |
| Teamcenter Rapid Start | Lien |
| Teamcenter Reporting and Analytics V11 | Lien |
| Teamcenter Reporting and Analytics V12.2 | Lien |
| Teamcenter Reporting and Analytics V12.3 | Lien |
| Teamcenter Reporting and Analytics V12.4 | Lien |
| Teamcenter Reporting and Analytics V13 | Lien |
| Teamcenter Retail Footwear and Apparel | Lien |
| Teamcenter Security Services | Lien |
| Teamcenter Supplier Collaboration | Lien |
| Teamcenter System Modeling Workbench | Lien |
| Teamcenter | Lien |
| Teamcenter Technical Publishing | Lien |
| Teamcenter Visualization V12.4 | Lien |
| Teamcenter Visualization V13.1 | Lien |
| Teamcenter Visualization V13.2 | Lien |
| Teamcenter Visualization V13.3 | Lien |
| Tecnomatix eBOP Manager Server | Lien |
| Tecnomatix Intosite | Lien |
| Tecnomatix Plant Simulation | Lien |
| Tecnomatix Process Designer | Lien |
| Tecnomatix Process Simulate | Lien |
| Tecnomatix Process Simulate VCLite | Lien |
| Tecnomatix RobotExpert | Lien |
| TeleControl Server Basic | Lien |
| TIA Administrator | Lien |
| TIA Administrator | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC | Lien |
| TIM 1531 IRC | Lien |
| TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
| Valor Parts Library - VPL Direct | Lien |
| Valor Parts Library - VPL Server or Service | Lien |
| VeSys | Lien |
| Xpedition Enterprise VX.2.10 | Lien |
| Xpedition Enterprise VX.2.6 | Lien |
| Xpedition Enterprise VX.2.7 | Lien |
| Xpedition Enterprise VX.2.8 | Lien |
| Xpedition Enterprise (XCR) VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.6 | Lien |
| Xpedition IC Packaging VX.2.7 | Lien |
| Xpedition IC Packaging VX.2.8 | Lien |
| Xpedition IC Packaging (XCR) VX.2.10 | Lien |
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40360"
},
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2021-37186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37186"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37198"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40363"
},
{
"name": "CVE-2021-46151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46151"
},
{
"name": "CVE-2021-44018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44018"
},
{
"name": "CVE-2022-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23312"
},
{
"name": "CVE-2021-41990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41990"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2021-46161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46161"
},
{
"name": "CVE-2021-41991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41991"
},
{
"name": "CVE-2021-46160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46160"
},
{
"name": "CVE-2022-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23102"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13933"
},
{
"name": "CVE-2019-8460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8460"
},
{
"name": "CVE-2019-6575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6575"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2019-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6568"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46156"
},
{
"name": "CVE-2021-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37197"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2021-37194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37194"
},
{
"name": "CVE-2021-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46153"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2021-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46152"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-37185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37185"
},
{
"name": "CVE-2021-46154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46154"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-37195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37195"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-46159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46159"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2021-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40358"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-44000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44000"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38405"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-46155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46155"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2021-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37196"
},
{
"name": "CVE-2021-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40364"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-37204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37204"
},
{
"name": "CVE-2019-19300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19300"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10942"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2017-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2681"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46158"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2021-46157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46157"
},
{
"name": "CVE-2021-45106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45106"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17437"
},
{
"name": "CVE-2021-44016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44016"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40359"
},
{
"name": "CVE-2021-37205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37205"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2019-19301",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19301"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
}
]
}
CERTFR-2021-AVI-430
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable LCE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable Log Correlation Engine versions ant\u00e9rieures \u00e0 6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-430",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable LCE. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable LCE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-10 du 01 juin 2021",
"url": "https://www.tenable.com/security/tns-2021-10"
}
]
}
CERTFR-2021-AVI-540
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits SonicWall. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Capture Client versions Cc 3.5 ant\u00e9rieures \u00e0 CC 3.6.24",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SMA100 versions 10.2.0.x ant\u00e9rieures \u00e0 10.2.1.0-17sv",
"product": {
"name": "N/A",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SonicOS(Gen7) NSa, TZ versions 7.0.1 ant\u00e9rieures \u00e0 Gen7 7.0.1-R1456",
"product": {
"name": "SonicOS",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-540",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSonicWall. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SonicWall",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2021-0013 du 15 juillet 2021",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013"
}
]
}
CERTFR-2021-AVI-318
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Zimbra. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Zimbra versions ant\u00e9rieures \u00e0 8.8.15 P21",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Zimbra versions 9.0.x ant\u00e9rieures \u00e0 9.0.0 P14",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3341"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-3327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3327"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-318",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zimbra. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Zimbra",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zimbra du 26 avril 2021",
"url": "https://blog.zimbra.com/2021/04/new-zimbra-patches-9-0-0-patch-14-and-8-8-15-patch-21/"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2021-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données. IBM note que CentOS 6 est en fin de vie. L'éditeur préconise des actions à envisager pour corriger des défauts de sécurité connus. Lien : http://ibm.biz/qradarcentos6
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.0 à 7.4.3 FP 4 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.0 à 7.3.3 FP 10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.4.0 \u00e0 7.4.3 FP 4",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.0 \u00e0 7.3.3 FP 10",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es. IBM note que CentOS 6 est en\nfin de vie. L\u0027\u00e9diteur pr\u00e9conise des actions \u00e0 envisager pour corriger\ndes d\u00e9fauts de s\u00e9curit\u00e9 connus. Lien : \u003chttp://ibm.biz/qradarcentos6\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 14 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-313
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Stormshield Management Center. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Management Center | Stormshield Management Center versions 2.8.x antérieures à 2.8.2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Management Center versions 2.8.x ant\u00e9rieures \u00e0 2.8.2",
"product": {
"name": "Stormshield Management Center",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-313",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-26T00:00:00.000000"
},
{
"description": "R\u00e9paration des liens des avis 15 et 16.",
"revision_date": "2021-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Stormshield\nManagement Center. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Stormshield Management Center",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-015 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-015/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-016 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-016/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-013 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-012 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-012/"
}
]
}
CERTFR-2021-AVI-374
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 5.13.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-374",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-09 du 11 mai 2021",
"url": "https://www.tenable.com/security/tns-2021-09"
}
]
}
CERTFR-2021-AVI-296
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL versions ant\u00e9rieures \u00e0 5.7.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL versions ant\u00e9rieures \u00e0 8.0.24",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8277"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2020-17530",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17530"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-296",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021verbose.html#MSQL"
}
]
}
CERTFR-2021-AVI-374
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 5.13.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-374",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-09 du 11 mai 2021",
"url": "https://www.tenable.com/security/tns-2021-09"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-415
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.2.1 antérieures à 4.2.2 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x.x antérieures à 3.7.20 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.1.5 antérieures à 4.1.6 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.x antérieures à 3.11.8 | ||
| Stormshield | N/A | Netasq versions 9.1.0 et 9.1.11 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 4.2.1 ant\u00e9rieures \u00e0 4.2.2",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.x.x ant\u00e9rieures \u00e0 3.7.20",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.1.5 ant\u00e9rieures \u00e0 4.1.6",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.x ant\u00e9rieures \u00e0 3.11.8",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.1.0 et 9.1.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1405"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1404"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-415",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-033 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-033/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-017 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-017/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2021-009 du 27 mai 2021",
"url": "https://advisories.stormshield.eu/2021-009/"
}
]
}
CERTFR-2021-AVI-395
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Spectrum Control. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions ant\u00e9rieures \u00e0 5.4.3",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27221"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-26296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26296"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-5258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5258"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-395",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Spectrum\nControl. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Spectrum Control",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6454803 du 20 mai 2021",
"url": "https://www.ibm.com/support/pages/node/6454803"
}
]
}
CERTFR-2021-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données. IBM note que CentOS 6 est en fin de vie. L'éditeur préconise des actions à envisager pour corriger des défauts de sécurité connus. Lien : http://ibm.biz/qradarcentos6
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.0 à 7.4.3 FP 4 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.0 à 7.3.3 FP 10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.4.0 \u00e0 7.4.3 FP 4",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.0 \u00e0 7.3.3 FP 10",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es. IBM note que CentOS 6 est en\nfin de vie. L\u0027\u00e9diteur pr\u00e9conise des actions \u00e0 envisager pour corriger\ndes d\u00e9fauts de s\u00e9curit\u00e9 connus. Lien : \u003chttp://ibm.biz/qradarcentos6\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 14 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données, un déni de service, une élévation de privilèges, une exécution de code à distance et une usurpation d'identité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 23 | ||
| Microsoft | N/A | System Center 2019 Operations Manager | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.1 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 21 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 11 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 22 | ||
| Microsoft | N/A | Intune management extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.0 | ||
| Microsoft | N/A | System Center 2016 Operations Manager | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 10 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | System Center 2012 R2 Operations Manager |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2013 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2019 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Intune management extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2016 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2012 R2 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-41355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41355"
},
{
"name": "CVE-2021-40474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40474"
},
{
"name": "CVE-2021-40479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40479"
},
{
"name": "CVE-2021-41354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41354"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34453"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-40485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40485"
},
{
"name": "CVE-2021-41348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41348"
},
{
"name": "CVE-2021-40472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40472"
},
{
"name": "CVE-2021-40473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40473"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-41363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41363"
},
{
"name": "CVE-2021-40481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40481"
},
{
"name": "CVE-2021-41352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41352"
},
{
"name": "CVE-2021-41353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41353"
},
{
"name": "CVE-2021-40480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40480"
},
{
"name": "CVE-2021-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40454"
},
{
"name": "CVE-2021-40457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40457"
},
{
"name": "CVE-2021-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26427"
},
{
"name": "CVE-2021-40471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40471"
},
{
"name": "CVE-2021-41350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41350"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la fonctionnalit\u00e9 de\ns\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de\nservice, une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de code \u00e0 distance\net une usurpation d\u0027identit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 octobre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2021-AVI-221
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans OpenSSL. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenSSL version 1.1.1 ant\u00e9rieures \u00e0 1.1.1k",
"product": {
"name": "OpenSSL",
"vendor": {
"name": "OpenSSL",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-221",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-03-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans OpenSSL. Elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL 20210325 du 25 mars 2021",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
]
}
CERTFR-2021-AVI-313
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Stormshield Management Center. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Management Center | Stormshield Management Center versions 2.8.x antérieures à 2.8.2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Management Center versions 2.8.x ant\u00e9rieures \u00e0 2.8.2",
"product": {
"name": "Stormshield Management Center",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-313",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-26T00:00:00.000000"
},
{
"description": "R\u00e9paration des liens des avis 15 et 16.",
"revision_date": "2021-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Stormshield\nManagement Center. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Stormshield Management Center",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-015 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-015/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-016 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-016/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-013 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2021-012 du 09 avril 2021",
"url": "https://advisories.stormshield.eu/2021-012/"
}
]
}
WID-SEC-W-2023-0065
Vulnerability from csaf_certbund - Published: 2021-04-20 22:00 - Updated: 2023-09-27 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0065 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-0065.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0065 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0065"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASMARIADB10.5-2023-004 vom 2023-09-27",
"url": "https://alas.aws.amazon.com/AL2/ALASMARIADB10.5-2023-004.html"
},
{
"category": "external",
"summary": "MariaDB 10.2.38 Release Notes",
"url": "https://mariadb.com/kb/en/mdb-10238-rn/"
},
{
"category": "external",
"summary": "MariaDB 10.3.29 Release Notes",
"url": "https://mariadb.com/kb/en/mariadb-10329-release-notes/"
},
{
"category": "external",
"summary": "MariaDB 10.5.10 Release Notes",
"url": "https://mariadb.com/kb/en/mariadb-10510-release-notes/"
},
{
"category": "external",
"summary": "MariaDB 10.4.19 Release Notes",
"url": "https://mariadb.com/kb/en/mariadb-10419-release-notes/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4952-1 vom 2021-05-14",
"url": "https://ubuntu.com/security/notices/USN-4952-1"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202105-14 vom 2021-05-19",
"url": "https://www.cybersecurity-help.cz/vdb/SB2021051922"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - April 2021 - Appendix Oracle MySQL vom 2021-04-20",
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202105-27 vom 2021-05-26",
"url": "https://security.gentoo.org/glsa/202105-27"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2605-1 vom 2021-08-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009249.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2617-1 vom 2021-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009251.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2616-1 vom 2021-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009258.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2634-1 vom 2021-08-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009263.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3590 vom 2021-09-21",
"url": "https://access.redhat.com/errata/RHSA-2021:3590"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-3590 vom 2021-09-23",
"url": "http://linux.oracle.com/errata/ELSA-2021-3590.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5022-3 vom 2021-10-07",
"url": "https://ubuntu.com/security/notices/USN-5022-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3811 vom 2021-10-12",
"url": "https://access.redhat.com/errata/RHSA-2021:3811"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1556 vom 2022-04-27",
"url": "https://access.redhat.com/errata/RHSA-2022:1556"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1557 vom 2022-04-27",
"url": "https://access.redhat.com/errata/RHSA-2022:1557"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-1556 vom 2022-04-27",
"url": "https://linux.oracle.com/errata/ELSA-2022-1556.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-1557 vom 2022-05-03",
"url": "http://linux.oracle.com/errata/ELSA-2022-1557.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1686 vom 2023-02-23",
"url": "https://alas.aws.amazon.com/ALAS-2023-1686.html"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-09-27T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:09.491+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0065",
"initial_release_date": "2021-04-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-04-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-05-05T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2021-05-06T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2021-05-13T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-05-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Arch Linux aufgenommen"
},
{
"date": "2021-05-25T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-08-04T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-05T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-08T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-09-20T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-22T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-07T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-10-12T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-26T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-27T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-05-03T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MariaDB MariaDB \u003c 10.3.29",
"product": {
"name": "MariaDB MariaDB \u003c 10.3.29",
"product_id": "T019246",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:10.3.29"
}
}
},
{
"category": "product_name",
"name": "MariaDB MariaDB \u003c 10.2.38",
"product": {
"name": "MariaDB MariaDB \u003c 10.2.38",
"product_id": "T019247",
"product_identification_helper": {
"cpe": "cpe:/a:mariadb:mariadb:10.2.38"
}
}
}
],
"category": "product_name",
"name": "MariaDB"
}
],
"category": "vendor",
"name": "MariaDB"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle MySQL \u003c= 8.0.23",
"product": {
"name": "Oracle MySQL \u003c= 8.0.23",
"product_id": "858555",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.0.23"
}
}
},
{
"category": "product_name",
"name": "Oracle MySQL \u003c= 5.7.33",
"product": {
"name": "Oracle MySQL \u003c= 5.7.33",
"product_id": "858573",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:5.7.33"
}
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-7317",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2019-7317"
},
{
"cve": "CVE-2020-17527",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2020-17527"
},
{
"cve": "CVE-2020-17530",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2020-17530"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-28196",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2020-28196"
},
{
"cve": "CVE-2020-8277",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2020-8277"
},
{
"cve": "CVE-2021-2144",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2144"
},
{
"cve": "CVE-2021-2146",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2146"
},
{
"cve": "CVE-2021-2154",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2154"
},
{
"cve": "CVE-2021-2160",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2160"
},
{
"cve": "CVE-2021-2162",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2162"
},
{
"cve": "CVE-2021-2164",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2164"
},
{
"cve": "CVE-2021-2166",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2166"
},
{
"cve": "CVE-2021-2169",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2169"
},
{
"cve": "CVE-2021-2170",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2170"
},
{
"cve": "CVE-2021-2171",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2171"
},
{
"cve": "CVE-2021-2172",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2172"
},
{
"cve": "CVE-2021-2174",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2174"
},
{
"cve": "CVE-2021-2178",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2178"
},
{
"cve": "CVE-2021-2179",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2179"
},
{
"cve": "CVE-2021-2180",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2180"
},
{
"cve": "CVE-2021-2193",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2193"
},
{
"cve": "CVE-2021-2194",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2194"
},
{
"cve": "CVE-2021-2196",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2196"
},
{
"cve": "CVE-2021-2201",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2201"
},
{
"cve": "CVE-2021-2202",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2202"
},
{
"cve": "CVE-2021-2203",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2203"
},
{
"cve": "CVE-2021-2208",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2208"
},
{
"cve": "CVE-2021-2212",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2212"
},
{
"cve": "CVE-2021-2213",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2213"
},
{
"cve": "CVE-2021-2215",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2215"
},
{
"cve": "CVE-2021-2217",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2217"
},
{
"cve": "CVE-2021-2226",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2226"
},
{
"cve": "CVE-2021-2230",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2230"
},
{
"cve": "CVE-2021-2232",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2232"
},
{
"cve": "CVE-2021-2278",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2278"
},
{
"cve": "CVE-2021-2293",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2293"
},
{
"cve": "CVE-2021-2298",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2298"
},
{
"cve": "CVE-2021-2299",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2299"
},
{
"cve": "CVE-2021-2300",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2300"
},
{
"cve": "CVE-2021-2301",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2301"
},
{
"cve": "CVE-2021-2304",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2304"
},
{
"cve": "CVE-2021-2305",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2305"
},
{
"cve": "CVE-2021-2307",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2307"
},
{
"cve": "CVE-2021-2308",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-2308"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter Angreifer die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion und keine Authentisierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Availability\", \"Confidentiality\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T012167",
"T004914",
"T025794"
],
"last_affected": [
"858573",
"858555"
]
},
"release_date": "2021-04-20T22:00:00.000+00:00",
"title": "CVE-2021-3450"
}
]
}
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund - Published: 2024-04-04 22:00 - Updated: 2024-11-27 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
WID-SEC-W-2025-0227
Vulnerability from csaf_certbund - Published: 2021-11-30 23:00 - Updated: 2025-01-30 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0227 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2025-0227.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0227 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0227"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520488 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520488"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520484 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520484"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520490 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520490"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520476 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520476"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520492 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520492"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520478 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520478"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520486 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520486"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520474 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520474"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520472 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520482 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520482"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520480 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182001 vom 2025-01-30",
"url": "https://www.ibm.com/support/pages/node/7182001"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-30T23:00:00.000+00:00",
"generator": {
"date": "2025-01-31T09:11:30.679+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0227",
"initial_release_date": "2021-11-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM QRadar SIEM 7.3",
"product_id": "T014687",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.3"
}
}
},
{
"category": "product_version",
"name": "7.4",
"product": {
"name": "IBM QRadar SIEM 7.4",
"product_id": "T016287",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.4"
}
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "IBM QRadar SIEM 7.5.0",
"product_id": "T023574",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2016-10228"
},
{
"cve": "CVE-2017-14502",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2017-14502"
},
{
"cve": "CVE-2017-15713",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2017-15713"
},
{
"cve": "CVE-2018-1000858",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-1000858"
},
{
"cve": "CVE-2018-11768",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-11768"
},
{
"cve": "CVE-2018-18751",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-18751"
},
{
"cve": "CVE-2018-20843",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-20843"
},
{
"cve": "CVE-2018-8029",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-8029"
},
{
"cve": "CVE-2019-13012",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13012"
},
{
"cve": "CVE-2019-13050",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13050"
},
{
"cve": "CVE-2019-13627",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13627"
},
{
"cve": "CVE-2019-14866",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2019-14889",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-14889"
},
{
"cve": "CVE-2019-15903",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-16935",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-18276",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-18276"
},
{
"cve": "CVE-2019-19221",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19221"
},
{
"cve": "CVE-2019-19906",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19906"
},
{
"cve": "CVE-2019-19956",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19956"
},
{
"cve": "CVE-2019-20387",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20387"
},
{
"cve": "CVE-2019-20388",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20388"
},
{
"cve": "CVE-2019-20454",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20907",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-20916",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20916"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2019-2708",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-2708"
},
{
"cve": "CVE-2019-3842",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-9169",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-9169"
},
{
"cve": "CVE-2019-9924",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-9924"
},
{
"cve": "CVE-2020-11080",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-11080"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-13434",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13434"
},
{
"cve": "CVE-2020-13543",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13543"
},
{
"cve": "CVE-2020-13584",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13584"
},
{
"cve": "CVE-2020-13776",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13776"
},
{
"cve": "CVE-2020-13777",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13777"
},
{
"cve": "CVE-2020-13954",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13954"
},
{
"cve": "CVE-2020-14352",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-14352"
},
{
"cve": "CVE-2020-14422",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-14422"
},
{
"cve": "CVE-2020-15358",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-1730",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-1730"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-24513",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24513"
},
{
"cve": "CVE-2020-24659",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24659"
},
{
"cve": "CVE-2020-24977",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24977"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-27619",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27619"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-28196",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-28196"
},
{
"cve": "CVE-2020-29361",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29361"
},
{
"cve": "CVE-2020-29362",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29362"
},
{
"cve": "CVE-2020-29363",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29363"
},
{
"cve": "CVE-2020-7226",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-7226"
},
{
"cve": "CVE-2020-7595",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-7595"
},
{
"cve": "CVE-2020-8177",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8492",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8927",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8927"
},
{
"cve": "CVE-2020-9492",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9492"
},
{
"cve": "CVE-2020-9948",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9948"
},
{
"cve": "CVE-2020-9951",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9951"
},
{
"cve": "CVE-2020-9983",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9983"
},
{
"cve": "CVE-2021-20271",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-20305",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20305"
},
{
"cve": "CVE-2021-2161",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-2161"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22696",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-22696"
},
{
"cve": "CVE-2021-23239",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23239"
},
{
"cve": "CVE-2021-23240",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23240"
},
{
"cve": "CVE-2021-23336",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-28163",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28163"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30468",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-30468"
},
{
"cve": "CVE-2021-31811",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-31811"
},
{
"cve": "CVE-2021-31812",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-31812"
},
{
"cve": "CVE-2021-32027",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32027"
},
{
"cve": "CVE-2021-32028",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32028"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3516",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3516"
},
{
"cve": "CVE-2021-3520",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3541",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3541"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-20400",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Es werden unsichere Kryptoalgorithmen genutzt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20400"
},
{
"cve": "CVE-2021-29779",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstellen ist auf eine fehlende Authentisierung beim Schl\u00fcsselaustausch zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29779"
},
{
"cve": "CVE-2021-29863",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstelle ist auf einen unzureichenden Patch zur\u00fcckzuf\u00fchren und erm\u00f6glicht einen Server-Site-Request-Forgery (SSRF)-Angriff. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29863"
},
{
"cve": "CVE-2021-29849",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29849"
}
]
}
WID-SEC-W-2022-0671
Vulnerability from csaf_certbund - Published: 2021-03-25 23:00 - Updated: 2024-11-25 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um kryptografische Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Appliance\n- CISCO Appliance\n- Hardware Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0671 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0671.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0671 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0671"
},
{
"category": "external",
"summary": "OpenSSL Security Advisory 20210325 vom 2021-03-25",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4891-1 vom 2021-03-25",
"url": "https://ubuntu.com/security/notices/USN-4891-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4875 vom 2021-03-25",
"url": "https://www.debian.org/security/2021/dsa-4875"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:0954-1 vom 2021-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008558.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:0955-1 vom 2021-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html"
},
{
"category": "external",
"summary": "FreeBSD Security Advisory FreeBSD-SA-21:07.openssl vom 2021-03-25",
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-21:07.openssl.asc"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202103-10 vom 2021-03-25",
"url": "https://security.archlinux.org/ASA-202103-10"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd vom 2021-03-25",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"category": "external",
"summary": "PoC CVE-2021-3449",
"url": "https://github.com/terorie/cve-2021-3449"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1622 vom 2021-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1622.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-1024 vom 2021-03-30",
"url": "https://linux.oracle.com/errata/ELSA-2021-1024.html"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd vom 2021-03-29",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1024 vom 2021-03-30",
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "external",
"summary": "Nessus Network Monitor Security Advisory",
"url": "https://de.tenable.com/security/tns-2021-09"
},
{
"category": "external",
"summary": "HPE Security Bulletin hpesbst04140en_us vom 2021-06-02",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04140en_us"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9151 vom 2021-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2021-9151.html"
},
{
"category": "external",
"summary": "Unify Security Advisory Report OBSO-2103-01 vom 2021-03-31",
"url": "https://networks.unify.com/security/advisories/OBSO-2103-01.pdf"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202103-03 vom 2021-03-31",
"url": "https://security.gentoo.org/glsa/202103-03"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd vom 2021-03-31",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd vom 2021-04-05",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd"
},
{
"category": "external",
"summary": "Tenable Security Advisory",
"url": "https://de.tenable.com/security/tns-2021-05"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1063 vom 2021-04-05",
"url": "https://access.redhat.com/errata/RHSA-2021:1063"
},
{
"category": "external",
"summary": "Brocade Security Advisory",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1440"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1131 vom 2021-04-07",
"url": "https://access.redhat.com/errata/RHSA-2021:1131"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1109-1 vom 2021-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html"
},
{
"category": "external",
"summary": "Tenable Security Advisory",
"url": "https://de.tenable.com/security/tns-2021-08"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1168 vom 2021-04-13",
"url": "https://access.redhat.com/errata/RHSA-2021:1168"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2021-025 vom 2021-04-13",
"url": "https://downloads.avaya.com/css/P8/documents/101075304"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1202 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1200 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1199 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1189 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1203 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1196 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1195 vom 2021-04-14",
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "external",
"summary": "McAfee Security Bulletin",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10356"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2041 vom 2021-05-19",
"url": "https://access.redhat.com/errata/RHSA-2021:2041"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2021.02 vom 2021-04-20",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-02-meinberg-lantime-firmware-v7-02-003-und-v6-24-028.htm"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-117 vom 2021-05-21",
"url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-117/index.html"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-119 vom 2021-05-21",
"url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-119/index.html"
},
{
"category": "external",
"summary": "Meinberg Security Advisory",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-02-meinberg-lantime-firmware-v7-02-003-und-v6-24-028.htm"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1338 vom 2021-04-22",
"url": "https://access.redhat.com/errata/RHSA-2021:1338"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1230 vom 2021-04-27",
"url": "https://access.redhat.com/errata/RHSA-2021:1230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1448 vom 2021-04-28",
"url": "https://access.redhat.com/errata/RHSA-2021:1448"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2479 vom 2021-06-17",
"url": "https://access.redhat.com/errata/RHSA-2021:2479"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2532 vom 2021-06-23",
"url": "https://access.redhat.com/errata/RHSA-2021:2532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2543 vom 2021-06-24",
"url": "https://access.redhat.com/errata/RHSA-2021:2543"
},
{
"category": "external",
"summary": "Pulse Secure Security Advisory SA44845 vom 2021-07-14",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845/?kA23Z000000L6ooSAC="
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2326-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2323-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2327-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2353-1 vom 2021-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04142en_us"
},
{
"category": "external",
"summary": "HCL Article KB0090800 vom 2021-08-03",
"url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0090800"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3016 vom 2021-08-06",
"url": "https://access.redhat.com/errata/RHSA-2021:3016"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5038-1 vom 2021-08-12",
"url": "https://ubuntu.com/security/notices/USN-5038-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2751 vom 2021-08-31",
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17",
"url": "https://access.redhat.com/errata/RHSA-2021:3556"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0056 vom 2022-03-10",
"url": "https://access.redhat.com/errata/RHSA-2022:0056"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04309en_us\u0026hprpt_id=ALERT_HPE_3024068\u0026jumpid=em_pom8nu6hj_aid-520066529"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:0955-2 vom 2022-07-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011541.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-13026 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-13026.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-13024 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-13024.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-13025 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-13025.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-32791 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-32791.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-32790 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-32790.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-13027 vom 2023-12-07",
"url": "https://linux.oracle.com/errata/ELSA-2023-13027.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2502 vom 2024-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2502.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05",
"url": "https://linux.oracle.com/errata/ELSA-2024-12408.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12842 vom 2024-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2024-12842.html"
}
],
"source_lang": "en-US",
"title": "OpenSSL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-25T23:00:00.000+00:00",
"generator": {
"date": "2024-11-26T09:24:52.224+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2022-0671",
"initial_release_date": "2021-03-25T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-03-25T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-03-28T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-03-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux, Cisco und Red Hat aufgenommen"
},
{
"date": "2021-03-30T22:00:00.000+00:00",
"number": "4",
"summary": "Referenz(en) aufgenommen: FEDORA-2021-CBF14AB8F9"
},
{
"date": "2021-03-31T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Cisco, Oracle Linux, Unify und Gentoo aufgenommen"
},
{
"date": "2021-04-05T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Cisco aufgenommen"
},
{
"date": "2021-04-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-04-08T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE und Tenable aufgenommen"
},
{
"date": "2021-04-12T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-04-14T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2021-04-15T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von McAfee aufgenommen"
},
{
"date": "2021-04-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2021-04-20T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2021-04-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-04-26T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-04-28T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-05-11T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Tenable aufgenommen"
},
{
"date": "2021-05-16T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2021-05-18T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-05-20T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2021-06-03T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2021-06-17T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-06-23T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-06-24T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-07-13T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Pulse Secure aufgenommen"
},
{
"date": "2021-07-14T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-15T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-25T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2021-08-02T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2021-08-05T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-12T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-08-31T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-09-16T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-10T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-22T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2022-07-13T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-12-07T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-03-18T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "40"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Firepower",
"product": {
"name": "Cisco Firepower",
"product_id": "T011337",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IP Phone",
"product": {
"name": "Cisco IP Phone",
"product_id": "2070",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:ip_phone:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Identity Services Engine (ISE)",
"product": {
"name": "Cisco Identity Services Engine (ISE)",
"product_id": "T000612",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:identity_services_engine_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Jabber",
"product": {
"name": "Cisco Jabber",
"product_id": "T013379",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:jabber:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Meeting Server",
"product": {
"name": "Cisco Meeting Server",
"product_id": "T018748",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:meeting_server:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "3000",
"product": {
"name": "Cisco Nexus 3000",
"product_id": "T003851",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:3000"
}
}
},
{
"category": "product_version",
"name": "9000",
"product": {
"name": "Cisco Nexus 9000",
"product_id": "T003853",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:9000"
}
}
}
],
"category": "product_name",
"name": "Nexus"
},
{
"category": "product_name",
"name": "Cisco Prime Infrastructure",
"product": {
"name": "Cisco Prime Infrastructure",
"product_id": "T000756",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:prime_infrastructure:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "c800 series",
"product": {
"name": "Cisco Router c800 series",
"product_id": "T018745",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:c800_series"
}
}
}
],
"category": "product_name",
"name": "Router"
},
{
"category": "product_name",
"name": "Cisco SD-WAN",
"product": {
"name": "Cisco SD-WAN",
"product_id": "T015770",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:sd_wan:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "RV320",
"product": {
"name": "Cisco Small Business RV320",
"product_id": "T013513",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:small_business:rv320"
}
}
},
{
"category": "product_version",
"name": "RV325",
"product": {
"name": "Cisco Small Business RV325",
"product_id": "T013514",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:small_business:rv325"
}
}
},
{
"category": "product_version",
"name": "RV130",
"product": {
"name": "Cisco Small Business RV130",
"product_id": "T018066",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:small_business:rv130"
}
}
}
],
"category": "product_name",
"name": "Small Business"
},
{
"category": "product_name",
"name": "Cisco Unified Computing System (UCS)",
"product": {
"name": "Cisco Unified Computing System (UCS)",
"product_id": "163824",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "RV130",
"product": {
"name": "Cisco Unified Contact Center Enterprise RV130",
"product_id": "2143",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:unified_contact_center_enterprise:-"
}
}
}
],
"category": "product_name",
"name": "Unified Contact Center Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "RV130",
"product": {
"name": "Cisco Unified Intelligent Contact Manager (ICM) RV130",
"product_id": "69412",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:unified_intelligent_contact_management_enterprise:-"
}
}
}
],
"category": "product_name",
"name": "Unified Intelligent Contact Manager (ICM)"
},
{
"branches": [
{
"category": "product_version",
"name": "Media Server",
"product": {
"name": "Cisco Video Surveillance Media Server",
"product_id": "T018749",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:video_surveillance_software:media_server"
}
}
}
],
"category": "product_name",
"name": "Video Surveillance"
},
{
"category": "product_name",
"name": "Cisco Web Security Appliance",
"product": {
"name": "Cisco Web Security Appliance",
"product_id": "T007921",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:web_security_appliance:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco WebEx Meetings Server",
"product": {
"name": "Cisco WebEx Meetings Server",
"product_id": "T001747",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:-"
}
}
},
{
"category": "product_version",
"name": "Wireless Phone",
"product": {
"name": "Cisco WebEx Wireless Phone",
"product_id": "T018746",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:wireless_phone"
}
}
},
{
"category": "product_version",
"name": "Room Phone",
"product": {
"name": "Cisco WebEx Room Phone",
"product_id": "T018747",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:room_phone"
}
}
},
{
"category": "product_version",
"name": "Meetings for iOS",
"product": {
"name": "Cisco WebEx Meetings for iOS",
"product_id": "T018759",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:meetings_for_ios"
}
}
},
{
"category": "product_version",
"name": "Video Mesh",
"product": {
"name": "Cisco WebEx Video Mesh",
"product_id": "T018760",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:video_mesh"
}
}
}
],
"category": "product_name",
"name": "WebEx"
},
{
"branches": [
{
"category": "product_version",
"name": "wap121",
"product": {
"name": "Cisco Wireless Access Point wap121",
"product_id": "T018761",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wap:wap121"
}
}
},
{
"category": "product_version",
"name": "wap321",
"product": {
"name": "Cisco Wireless Access Point wap321",
"product_id": "T018762",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wap:wap321"
}
}
},
{
"category": "product_version",
"name": "wap371",
"product": {
"name": "Cisco Wireless Access Point wap371",
"product_id": "T018763",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wap:wap371"
}
}
}
],
"category": "product_name",
"name": "Wireless Access Point"
},
{
"branches": [
{
"category": "product_version",
"name": "8821",
"product": {
"name": "Cisco Wireless IP Phone 8821",
"product_id": "T015978",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wireless_ip_phone:8821"
}
}
}
],
"category": "product_name",
"name": "Wireless IP Phone"
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "HCL BigFix",
"product": {
"name": "HCL BigFix",
"product_id": "T017494",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:-"
}
}
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.1b",
"product": {
"name": "HPE Fabric OS \u003c9.0.1b",
"product_id": "T019364"
}
},
{
"category": "product_version",
"name": "9.0.1b",
"product": {
"name": "HPE Fabric OS 9.0.1b",
"product_id": "T019364-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:9.0.1b"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.3",
"product": {
"name": "HPE Fabric OS \u003c8.2.3",
"product_id": "T019365"
}
},
{
"category": "product_version",
"name": "8.2.3",
"product": {
"name": "HPE Fabric OS 8.2.3",
"product_id": "T019365-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:8.2.3"
}
}
}
],
"category": "product_name",
"name": "Fabric OS"
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T017562",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11.x",
"product": {
"name": "McAfee Data Loss Prevention 11.x",
"product_id": "T018908",
"product_identification_helper": {
"cpe": "cpe:/a:mcafee:data_loss_prevention:11.x"
}
}
}
],
"category": "product_name",
"name": "Data Loss Prevention"
},
{
"category": "product_name",
"name": "McAfee Threat Intelligence Exchange",
"product": {
"name": "McAfee Threat Intelligence Exchange",
"product_id": "T014994",
"product_identification_helper": {
"cpe": "cpe:/a:mcafee:threat_intelligence_exchange:-"
}
}
},
{
"category": "product_name",
"name": "McAfee Web Gateway",
"product": {
"name": "McAfee Web Gateway",
"product_id": "T003324",
"product_identification_helper": {
"cpe": "cpe:/a:mcafee:web_gateway:-"
}
}
}
],
"category": "vendor",
"name": "McAfee"
},
{
"branches": [
{
"category": "product_name",
"name": "Meinberg LANTIME",
"product": {
"name": "Meinberg LANTIME",
"product_id": "T018353",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:-"
}
}
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.1.1k",
"product": {
"name": "Open Source OpenSSL \u003c1.1.1k",
"product_id": "T018712"
}
},
{
"category": "product_version",
"name": "1.1.1k",
"product": {
"name": "Open Source OpenSSL 1.1.1k",
"product_id": "T018712-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:1.1.1k"
}
}
}
],
"category": "product_name",
"name": "OpenSSL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Pulse Secure Pulse Connect Secure",
"product": {
"name": "Pulse Secure Pulse Connect Secure",
"product_id": "T016869",
"product_identification_helper": {
"cpe": "cpe:/a:pulsesecure:pulse_connect_secure:-"
}
}
}
],
"category": "vendor",
"name": "Pulse Secure"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.13.2",
"product": {
"name": "Tenable Security Nessus \u003c8.13.2",
"product_id": "T018777"
}
},
{
"category": "product_version",
"name": "8.13.2",
"product": {
"name": "Tenable Security Nessus 8.13.2",
"product_id": "T018777-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus:8.13.2"
}
}
}
],
"category": "product_name",
"name": "Nessus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.13.1",
"product": {
"name": "Tenable Security Nessus Network Monitor \u003c5.13.1",
"product_id": "T019318"
}
},
{
"category": "product_version",
"name": "5.13.1",
"product": {
"name": "Tenable Security Nessus Network Monitor 5.13.1",
"product_id": "T019318-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus_network_monitor:5.13.1"
}
}
}
],
"category": "product_name",
"name": "Nessus Network Monitor"
}
],
"category": "vendor",
"name": "Tenable Security"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "Unify OpenScape 4000",
"product": {
"name": "Unify OpenScape 4000",
"product_id": "T018011",
"product_identification_helper": {
"cpe": "cpe:/h:unify:openscape_4000:-"
}
}
},
{
"category": "product_name",
"name": "Unify OpenScape Branch",
"product": {
"name": "Unify OpenScape Branch",
"product_id": "T018258",
"product_identification_helper": {
"cpe": "cpe:/h:unify:openscape_branch:-"
}
}
},
{
"category": "product_name",
"name": "Unify OpenScape SBC",
"product": {
"name": "Unify OpenScape SBC",
"product_id": "T008874",
"product_identification_helper": {
"cpe": "cpe:/a:unify:openscape_sbc:-"
}
}
},
{
"category": "product_name",
"name": "Unify OpenScape Xpert",
"product": {
"name": "Unify OpenScape Xpert",
"product_id": "T018014",
"product_identification_helper": {
"cpe": "cpe:/h:unify:openscape_xpert:-"
}
}
}
],
"category": "vendor",
"name": "Unify"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In OpenSSL besteht eine Schwachstelle in der TLS Serverimplementierung. L\u00e4sst der Client bei einem erneuten (Renegotiation) \"ClientHello\" die \"signature_algorithms\" Erweiterung weg, obwohl sie im vorigen \"ClientHello\" enthalten war und sendet trotzdem die Erweiterung \"signature_algorithms_cert\" mit, so l\u00f6st er damit am Server eine NULL-Zeiger Dereferenzierung aus. Ein entfernter, anonymer Angreifer kann dies ausnutzen, um einen TLS Server zum Absturz zu bringen (Denial of Service). Serverimplementierungen, die keine TLS Renegotiation verwenden, sind nicht betroffen."
}
],
"product_status": {
"known_affected": [
"2070",
"T008874",
"T015844",
"T014994",
"T004914",
"T018760",
"T018761",
"T018762",
"T018763",
"T000756",
"398363",
"69412",
"163824",
"T015519",
"T003851",
"T003853",
"T005119",
"T013379",
"T012167",
"T018011",
"T017562",
"T018014",
"T018258",
"2951",
"T002207",
"T018777",
"67646",
"T003324",
"T007921",
"T017494",
"T018066",
"T001747",
"T000612",
"T018745",
"T018746",
"T018747",
"T019318",
"T018748",
"T018749",
"T018908",
"T013514",
"T015978",
"T016869",
"T011337",
"T013513",
"2143",
"T019364",
"T018353",
"T015770",
"T019365",
"T018712",
"T000126",
"T018759"
]
},
"release_date": "2021-03-25T23:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In OpenSSL besteht eine Schwachstelle. Wurde die Validierung einer Zertifikatskette mit dem Parameter \"X509_V_FLAG_X509_STRICT\" gestartet, werden erweiterte Zertifikatspr\u00fcfungen vorgenommen. Mit OpenSSL Version 1.1.1h wurde hierzu eine Pr\u00fcfung aufgenommen, um Zertifikate mit expliziten elliptischen Kurvenparametern zu verbieten. Durch einen Implementierungsfehler in diesem Feature werden jedoch CA-Zertifikate (Certificate Authority) in der Kette nicht mehr zuverl\u00e4ssig auf die Eigenschaft validiert, ob der Zertifikatsinhaber als CA t\u00e4tig sein darf. Ein Angreifer kann dadurch sein g\u00fcltiges Client- oder Server-Zertifikat zweckentfremden und damit beliebige Zertifikate signieren, die eine betroffene OpenSSL Version f\u00e4lschlicherweise als g\u00fcltig erkennt. Der Angreifer kann folglich kryptografische Sicherheitsmechanismen umgehen."
}
],
"product_status": {
"known_affected": [
"2070",
"T008874",
"67646",
"T003324",
"T007921",
"T014994",
"T004914",
"T018066",
"T018760",
"T018761",
"T018762",
"T018763",
"T001747",
"T000756",
"T000612",
"T018745",
"T018746",
"T018747",
"T018748",
"T018749",
"398363",
"T018908",
"69412",
"163824",
"T015519",
"T013514",
"T003851",
"T015978",
"T011337",
"T003853",
"T013513",
"2143",
"T013379",
"T012167",
"T018011",
"T015770",
"T018014",
"T018258",
"2951",
"T002207",
"T018777",
"T018712",
"T000126",
"T018759"
]
},
"release_date": "2021-03-25T23:00:00.000+00:00",
"title": "CVE-2021-3450"
}
]
}
ICSA-22-104-05
Vulnerability from csaf_cisa - Published: 2022-04-14 00:00 - Updated: 2022-05-12 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting this vulnerability to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of this vulnerability may allow an unauthenticated attacker to cause a denial-of-service condition if a maliciously crafted renegotiation message is sent.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "external",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-772220.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-05 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-104-05.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-05 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-05"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"category": "external",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-772220.txt"
}
],
"title": "Siemens OpenSSL Vulnerabilities in Industrial Products",
"tracking": {
"current_release_date": "2022-05-12T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-104-05",
"initial_release_date": "2022-04-14T00:00:00.000000Z",
"revision_history": [
{
"date": "2022-04-14T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-22-104-05 Siemens OpenSSL Vulnerabilities in Industrial Products"
},
{
"date": "2022-05-12T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-22-104-05 Siemens OpenSSL Vulnerabilities in Industrial Products (Update A)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V5.2.0 \u003c V5.3 only when running on ROX II V2.14.0",
"product": {
"name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V1.1",
"product": {
"name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5998-3GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "CSAFPID-00010",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "CSAFPID-00011",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "CSAFPID-00012",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
"product_id": "CSAFPID-00013",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "CSAFPID-00014",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "CSAFPID-00015",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003c V7.1",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "CSAFPID-00016",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V4.1",
"product": {
"name": "SCALANCE S602",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V4.1",
"product": {
"name": "SCALANCE S612",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.2 \u003cV7.1",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
"product_id": "CSAFPID-00019",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V4.1",
"product": {
"name": "SCALANCE S623",
"product_id": "CSAFPID-00020"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V4.1",
"product": {
"name": "SCALANCE S627-2M",
"product_id": "CSAFPID-00021"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.1.4",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "CSAFPID-00022",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.1.4",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "CSAFPID-00023",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.1.4",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "CSAFPID-00024",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.1.4",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "CSAFPID-00025",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.1.4",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "CSAFPID-00026",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V6.5",
"product": {
"name": "SCALANCE W-700 IEEE 802.11n family",
"product_id": "CSAFPID-00027"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "CSAFPID-00028",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "CSAFPID-00029",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "CSAFPID-00030",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "CSAFPID-00031",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "CSAFPID-00032",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V3.0",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "CSAFPID-00033",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.3",
"product": {
"name": "SCALANCE XB-200",
"product_id": "CSAFPID-00034"
}
}
],
"category": "product_name",
"name": "SCALANCE XB-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.3",
"product": {
"name": "SCALANCE XC-200",
"product_id": "CSAFPID-00035"
}
}
],
"category": "product_name",
"name": "SCALANCE XC-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.3",
"product": {
"name": "SCALANCE XF-200BA",
"product_id": "CSAFPID-00036"
}
}
],
"category": "product_name",
"name": "SCALANCE XF-200BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V6.4",
"product": {
"name": "SCALANCE XM-400",
"product_id": "CSAFPID-00037"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.3",
"product": {
"name": "SCALANCE XP-200",
"product_id": "CSAFPID-00038"
}
}
],
"category": "product_name",
"name": "SCALANCE XP-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.3",
"product": {
"name": "SCALANCE XR-300WG",
"product_id": "CSAFPID-00039"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-300WG"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V6.4",
"product": {
"name": "SCALANCE XR-500 Family",
"product_id": "CSAFPID-00040"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V1.1 \u003c V1.6",
"product": {
"name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)",
"product_id": "CSAFPID-00041",
"product_identification_helper": {
"model_numbers": [
"6GK1411-1AC00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V1.1 \u003c V1.6",
"product": {
"name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)",
"product_id": "CSAFPID-00042",
"product_identification_helper": {
"model_numbers": [
"6GK1411-5AC00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)",
"product_id": "CSAFPID-00043",
"product_identification_helper": {
"model_numbers": [
"6GK7242-7KX31-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)",
"product_id": "CSAFPID-00044",
"product_identification_helper": {
"model_numbers": [
"6GK7243-1BX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)",
"product_id": "CSAFPID-00045",
"product_identification_helper": {
"model_numbers": [
"6GK7243-7KX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)",
"product_id": "CSAFPID-00046",
"product_identification_helper": {
"model_numbers": [
"6GK7243-7SX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)",
"product_id": "CSAFPID-00047",
"product_identification_helper": {
"model_numbers": [
"6GK7243-8RX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.1 \u003c V2.2.28",
"product": {
"name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)",
"product_id": "CSAFPID-00048",
"product_identification_helper": {
"model_numbers": [
"6GK7542-6VX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.2 \u003c V3.0",
"product": {
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)",
"product_id": "CSAFPID-00049",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1AX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.1 \u003c V2.2.28",
"product": {
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)",
"product_id": "CSAFPID-00050",
"product_identification_helper": {
"model_numbers": [
"6GK7543-6WX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V1.0 \u003c V1.1",
"product": {
"name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)",
"product_id": "CSAFPID-00051",
"product_identification_helper": {
"model_numbers": [
"6GK7545-1GX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI Comfort Outdoor Panels 7\" \u0026 15\" (incl. SIPLUS variants)",
"product_id": "CSAFPID-00052"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Comfort Outdoor Panels 7\" \u0026 15\" (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants)",
"product_id": "CSAFPID-00053"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI KTP Mobile Panels",
"product_id": "CSAFPID-00054"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI KTP Mobile Panels"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V1.6 Upd2 \u003c V1.6 Upd5",
"product": {
"name": "SIMATIC Logon (6ES7658-7BX61-0YA0)",
"product_id": "CSAFPID-00055",
"product_identification_helper": {
"model_numbers": [
"6ES7658-7BX61-0YA0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC Logon (6ES7658-7BX61-0YA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10)",
"product_id": "CSAFPID-00056",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10)",
"product_id": "CSAFPID-00057",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10)",
"product_id": "CSAFPID-00058",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10)",
"product_id": "CSAFPID-00059",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10)",
"product_id": "CSAFPID-00060",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0LE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10)",
"product_id": "CSAFPID-00061",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0HE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V9.1",
"product": {
"name": "SIMATIC PCS 7 TeleControl",
"product_id": "CSAFPID-00062"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 TeleControl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1",
"product": {
"name": "SIMATIC PCS neo",
"product_id": "CSAFPID-00063"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS neo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V9.1 Upd 7 \u003c V9.2 SP 1",
"product": {
"name": "SIMATIC PDM",
"product_id": "CSAFPID-00064"
}
}
],
"category": "product_name",
"name": "SIMATIC PDM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= 2019 \u003c 2020 Upd1",
"product": {
"name": "SIMATIC Process Historian OPC UA Server",
"product_id": "CSAFPID-00065"
}
}
],
"category": "product_name",
"name": "SIMATIC Process Historian OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF166C (6GT2002-0EE20)",
"product_id": "CSAFPID-00066",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0EE20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF166C (6GT2002-0EE20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF185C (6GT2002-0JE10)",
"product_id": "CSAFPID-00067",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF185C (6GT2002-0JE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF186C (6GT2002-0JE20)",
"product_id": "CSAFPID-00068",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF186C (6GT2002-0JE20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF186CI (6GT2002-0JE50)",
"product_id": "CSAFPID-00069",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE50"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF186CI (6GT2002-0JE50)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF188C (6GT2002-0JE40)",
"product_id": "CSAFPID-00070",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE40"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF188C (6GT2002-0JE40)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF188CI (6GT2002-0JE60)",
"product_id": "CSAFPID-00071",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE60"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF188CI (6GT2002-0JE60)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SIMATIC RF360R (6GT2801-5BA30)",
"product_id": "CSAFPID-00072",
"product_identification_helper": {
"model_numbers": [
"6GT2801-5BA30"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF360R (6GT2801-5BA30)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.0",
"product": {
"name": "SIMATIC RF610R (6GT2811-6BC10)",
"product_id": "CSAFPID-00073",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6BC10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF610R (6GT2811-6BC10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.0",
"product": {
"name": "SIMATIC RF615R (6GT2811-6CC10)",
"product_id": "CSAFPID-00074",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6CC10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF615R (6GT2811-6CC10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.0",
"product": {
"name": "SIMATIC RF650R (6GT2811-6AB20)",
"product_id": "CSAFPID-00075",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6AB20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF650R (6GT2811-6AB20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.0",
"product": {
"name": "SIMATIC RF680R (6GT2811-6AA10)",
"product_id": "CSAFPID-00076",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6AA10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF680R (6GT2811-6AA10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.0",
"product": {
"name": "SIMATIC RF685R (6GT2811-6CA10)",
"product_id": "CSAFPID-00077",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6CA10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF685R (6GT2811-6CA10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V4.5.2",
"product": {
"name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)",
"product_id": "CSAFPID-00078"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.9.3",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0, 6AG1518-4AX00-4AC0, incl. SIPLUS variant)",
"product_id": "CSAFPID-00079"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0, 6AG1518-4AX00-4AC0, incl. SIPLUS variant)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V17 Update 1",
"product": {
"name": "SIMATIC WinCC Runtime Advanced",
"product_id": "CSAFPID-00080"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Runtime Advanced"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC WinCC TeleControl",
"product_id": "CSAFPID-00081"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC TeleControl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SINAMICS Connect 300",
"product_id": "CSAFPID-00082"
}
}
],
"category": "product_name",
"name": "SINAMICS Connect 300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V1.0 SP1 \u003c V1.0 SP2",
"product": {
"name": "SINEC NMS",
"product_id": "CSAFPID-00083"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions V14 \u003c V14 SP3",
"product": {
"name": "SINEMA Server",
"product_id": "CSAFPID-00084"
}
}
],
"category": "product_name",
"name": "SINEMA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V3.1 SP1",
"product": {
"name": "SINUMERIK OPC UA Server",
"product_id": "CSAFPID-00085"
}
}
],
"category": "product_name",
"name": "SINUMERIK OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.1 \u003c V2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)",
"product_id": "CSAFPID-00086",
"product_identification_helper": {
"model_numbers": [
"6AG2542-6VX00-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.1 \u003c V2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)",
"product_id": "CSAFPID-00087",
"product_identification_helper": {
"model_numbers": [
"6AG1543-6WX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.1 \u003c V2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)",
"product_id": "CSAFPID-00088",
"product_identification_helper": {
"model_numbers": [
"6AG2543-6WX00-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)",
"product_id": "CSAFPID-00089",
"product_identification_helper": {
"model_numbers": [
"6AG1242-7KX31-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.2 \u003c V3.0",
"product": {
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)",
"product_id": "CSAFPID-00090",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1AX00-2XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)",
"product_id": "CSAFPID-00091",
"product_identification_helper": {
"model_numbers": [
"6AG1243-1BX30-2AX0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V3.1 \u003c V3.3.46",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)",
"product_id": "CSAFPID-00092",
"product_identification_helper": {
"model_numbers": [
"6AG2243-1BX30-1XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.2",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)",
"product_id": "CSAFPID-00093",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1MX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V1.0 SP4",
"product": {
"name": "TIA Administrator",
"product_id": "CSAFPID-00094"
}
}
],
"category": "product_name",
"name": "TIA Administrator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V2.0 \u003c V2.2",
"product": {
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)",
"product_id": "CSAFPID-00095",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1MX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j). CVE-2021-3449 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated. the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00029",
"CSAFPID-00028",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095"
]
},
"references": [
{
"category": "external",
"summary": "nvd.nist.gov",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to Remote Access service, if used, to mitigate this issue. This service is disabled by default.",
"product_ids": [
"CSAFPID-00055"
]
},
{
"category": "mitigation",
"details": "Restrict access to the command interface, if used, to mitigate this issue. This interface is disabled by default.",
"product_ids": [
"CSAFPID-00064"
]
},
{
"category": "mitigation",
"details": "Update ROX II to V2.14.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109800780/) or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "use TLS v1.3 only",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00019"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00027",
"CSAFPID-00082"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-00081"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.2.28 or later version",
"product_ids": [
"CSAFPID-00048",
"CSAFPID-00050",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version\nTo obtain SIMATIC PCS neo V3.1 contact your local support.",
"product_ids": [
"CSAFPID-00063"
]
},
{
"category": "vendor_fix",
"details": "Update to V9.1 or later version",
"product_ids": [
"CSAFPID-00062"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/"
},
{
"category": "vendor_fix",
"details": "Update to V9.2 SP 1 or later version",
"product_ids": [
"CSAFPID-00064"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805353/"
},
{
"category": "vendor_fix",
"details": "Update to V1.6 Upd5 or later version",
"product_ids": [
"CSAFPID-00055"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109794407/"
},
{
"category": "vendor_fix",
"details": "Update SIMATIC PCS neo to V3.1 or later version\nTo obtain SIMATIC PCS neo V3.1 contact your local support.",
"product_ids": [
"CSAFPID-00065"
]
},
{
"category": "vendor_fix",
"details": "Update to V4.5.2 or later version",
"product_ids": [
"CSAFPID-00078"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109793280/"
},
{
"category": "vendor_fix",
"details": "Update to V4.3 or later version",
"product_ids": [
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00038",
"CSAFPID-00039"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109799569"
},
{
"category": "vendor_fix",
"details": "Update to V6.4 or later version",
"product_ids": [
"CSAFPID-00037"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796319"
},
{
"category": "vendor_fix",
"details": "Update to V6.4 or later version",
"product_ids": [
"CSAFPID-00040"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796317"
},
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805118/"
},
{
"category": "vendor_fix",
"details": "Update to V7.1 or later version",
"product_ids": [
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00019"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109807276"
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2",
"product_ids": [
"CSAFPID-00083"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109797645/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808633"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-00072"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808759"
},
{
"category": "vendor_fix",
"details": "Update to V2.9.3 or later version",
"product_ids": [
"CSAFPID-00079"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP4 or later version",
"product_ids": [
"CSAFPID-00094"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/114358/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 SP1 or later version",
"product_ids": [
"CSAFPID-00085"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109801292"
},
{
"category": "vendor_fix",
"details": "Update to V17.0 Upd 2 or later version",
"product_ids": [
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/"
},
{
"category": "vendor_fix",
"details": "Update to V17 Update 1 or later version",
"product_ids": [
"CSAFPID-00080"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109800912"
},
{
"category": "vendor_fix",
"details": "Update to V3.3.46 or later version",
"product_ids": [
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00089",
"CSAFPID-00091",
"CSAFPID-00092"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109812218"
},
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-00051"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109811116/"
},
{
"category": "vendor_fix",
"details": "Update to V14 SP3 or later version",
"product_ids": [
"CSAFPID-00084"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109801374/"
},
{
"category": "vendor_fix",
"details": "Update to V2.1.4 or later version",
"product_ids": [
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109797244"
},
{
"category": "vendor_fix",
"details": "Update to V1.6 or later version",
"product_ids": [
"CSAFPID-00041",
"CSAFPID-00042"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109803418/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109804366"
},
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"CSAFPID-00093",
"CSAFPID-00095"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
},
{
"category": "vendor_fix",
"details": "Update to V3.0 or later version",
"product_ids": [
"CSAFPID-00049",
"CSAFPID-00090"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109800773"
},
{
"category": "vendor_fix",
"details": "Update to V5.3 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109813558/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0 or later version",
"product_ids": [
"CSAFPID-00029",
"CSAFPID-00028",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0 or later version",
"product_ids": [
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808361"
},
{
"category": "vendor_fix",
"details": "Update to V7.1 or later version",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109807276/"
},
{
"category": "mitigation",
"details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00029",
"CSAFPID-00028",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00029",
"CSAFPID-00028",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095"
]
}
],
"title": "CVE-2021-3449"
}
]
}
ICSA-21-336-06
Vulnerability from csaf_cisa - Published: 2021-12-02 00:00 - Updated: 2021-12-02 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Hitachi Energy",
"summary": "reporting to CISA that Transformer APM Edge contains open-source components with these known vulnerabilities"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of this vulnerability could cause the product to become inaccessible.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Switzerland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-21-336-06 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-336-06.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-336-06 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-336-06"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Hitachi Energy APM Edge",
"tracking": {
"current_release_date": "2021-12-02T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-336-06",
"initial_release_date": "2021-12-02T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-12-02T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-21-336-06 Hitachi Energy APM Edge"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "APM Edge: Version 3.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "APM Edge"
},
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "APM Edge: Version 2.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "APM Edge"
},
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "APM Edge: Version 1.0",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "APM Edge"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Hitachi Energy is aware of public reports of this vulnerability in the following open-source software components: OpenSSL, LibSSL, libxml2 and GRUB2 bootloader. The vulnerability also affects some APM Edge products. An attacker who successfully exploits this vulnerability could cause the product to become inaccessible. SEE NVD for full Description.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2019-1563",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2019-1549",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2019-1547",
"cwe": {
"id": "CWE-1357",
"name": "Reliance on Insufficiently Trustworthy Component"
},
"notes": [
{
"category": "summary",
"text": "Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-23841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2017-8872",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2019-20388",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-24977",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-3516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-3517",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-3518",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-3537",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-3541",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-10713",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-14308",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In grub2 versions before 2.06 the grub memory allocator doesn\u0027t check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-14309",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "There\u0027s an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-14310",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn\u0027t verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-14311",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-15705",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "summary",
"text": "GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-15706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-15707",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-14372",
"cwe": {
"id": "CWE-184",
"name": "Incomplete List of Disallowed Inputs"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-25632",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-27749",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2020-27779",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub\u0027s memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-20225",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
},
{
"cve": "CVE-2021-20233",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3449"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1971"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1563"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1549"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1547"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23841"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8872"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20388"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24977"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3516"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3517"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3518"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3537"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37182"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3541"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10713"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14308"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14309"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14310"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14311"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15705"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15706"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15707"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14372"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25632"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27749"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27779"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20225"
},
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20233"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Hitachi Energy recommends users update to Transformer APM Edge v4.0. This version updates the software components to remediate this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Do not directly connect to the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Separated from other networks by means of a firewall system that has a minimal number of ports exposed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "mitigation",
"details": "Please see Hitachi Energy advisory 8DBD000057 for additional mitigation and update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000057\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
]
}
]
}
ICSA-22-069-09
Vulnerability from csaf_cisa - Published: 2022-03-08 00:00 - Updated: 2025-05-06 06:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "71 vulnerabilities in third-party components as Node.js, cURL, SQLite, CivetWeb and DNS(ISC BIND) could allow an attacker to interfere with the affected product in various ways.\n\nSiemens has released an update for SINEC INS and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json"
},
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt"
},
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-069-09 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-069-09 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINEC INS",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-069-09",
"initial_release_date": "2022-03-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2022-03-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.0.1.1",
"product": {
"name": "SINEC INS",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SINEC INS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-19242",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19242 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19242 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19242"
},
{
"cve": "CVE-2019-19244",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19244 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19244 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19244"
},
{
"cve": "CVE-2019-19317",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19317 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19317 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19317"
},
{
"cve": "CVE-2019-19603",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19603 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19603 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19603"
},
{
"cve": "CVE-2019-19645",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19645 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19645 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19645"
},
{
"cve": "CVE-2019-19646",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19646 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19646 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19646"
},
{
"cve": "CVE-2019-19880",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19880 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19880 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19923 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19923 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19924",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19924 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19924 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19924"
},
{
"cve": "CVE-2019-19925",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "summary",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19925 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19925 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2019-19926 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19926 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-1971 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-1971 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-7774",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"notes": [
{
"category": "summary",
"text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-7774 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-7774 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8169",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8169 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8169 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8177 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8177 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8231 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8231 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8265 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8265 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8265"
},
{
"cve": "CVE-2020-8284",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8284 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8284 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8285 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8285 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8286 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8286 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8287",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8287 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8287 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8287"
},
{
"cve": "CVE-2020-8625",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-8625 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8625 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-9327",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-9327 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-9327 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-9327"
},
{
"cve": "CVE-2020-11655",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-11655 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-11655 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-11655"
},
{
"cve": "CVE-2020-11656",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-11656 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-11656 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-11656"
},
{
"cve": "CVE-2020-13630",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-13630 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13630 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-13630"
},
{
"cve": "CVE-2020-13631",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-13631 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13631 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-13631"
},
{
"cve": "CVE-2020-13632",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-13632 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13632 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-13632"
},
{
"cve": "CVE-2020-13871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-13871 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13871 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-13871"
},
{
"cve": "CVE-2020-15358",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-15358 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-15358 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-27304",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2020-27304 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-27304 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-27304"
},
{
"cve": "CVE-2021-3449",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-3449 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3449 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-3450 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3450 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3672",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-3672 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3672 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3672"
},
{
"cve": "CVE-2021-3711",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-3711 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3711 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-3712 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3712 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-22876",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22876 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22876 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22883",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22883 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22883 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22883"
},
{
"cve": "CVE-2021-22884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22884 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22884 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22884"
},
{
"cve": "CVE-2021-22890",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "summary",
"text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22890 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22890 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22897 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22897 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22898 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22898 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22901 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22901 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22918",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22918 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22918 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-22921",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22921 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22921 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22921"
},
{
"cve": "CVE-2021-22922",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22922 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22922 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "summary",
"text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22923 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22923 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"notes": [
{
"category": "summary",
"text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22924 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22924 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22925 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22925 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22926 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22926 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22930",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22930 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22930 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22930"
},
{
"cve": "CVE-2021-22931",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22931 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22931 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22931"
},
{
"cve": "CVE-2021-22939",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22939 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22939 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22939"
},
{
"cve": "CVE-2021-22940",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22940 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22940 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22940"
},
{
"cve": "CVE-2021-22945",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22945 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22945 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22946 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22946 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-22947 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22947 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23362",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-23362 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-23362 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-23840 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-23840 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-25214",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-25214 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25214 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25215",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-25215 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25215 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-25215"
},
{
"cve": "CVE-2021-25216",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-25216 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25216 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-25216"
},
{
"cve": "CVE-2021-25219",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-25219 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25219 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-25219"
},
{
"cve": "CVE-2021-27290",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-27290 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-27290 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-32803",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-32803 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-32803 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-32804 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-32804 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-37701",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-37701 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37701 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-37712 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37712 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-37713 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37713 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-39134",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "summary",
"text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-39134 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-39134 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-39134"
},
{
"cve": "CVE-2021-39135",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "summary",
"text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "CVE-2021-39135 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-39135 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-39135"
}
]
}
RHSA-2021_1203
Vulnerability from csaf_redhat - Published: 2021-04-14 17:57 - Updated: 2024-11-22 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 7 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 12 serves as a replacement for Red Hat JBoss Web Server 3.1.11, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1203",
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1203.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update",
"tracking": {
"current_release_date": "2024-11-22T16:41:03+00:00",
"generator": {
"date": "2024-11-22T16:41:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1203",
"initial_release_date": "2021-04-14T17:57:20+00:00",
"revision_history": [
{
"date": "2021-04-14T17:57:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T17:57:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:41:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1",
"product": {
"name": "Red Hat JBoss Web Server 3.1",
"product_id": "Red Hat JBoss Web Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T17:57:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T17:57:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1195
Vulnerability from csaf_redhat - Published: 2021-04-14 14:48 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Red Hat JBoss Web Server 5.4.2 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.2 serves as a replacement for Red Hat JBoss Web Server 5.4.1, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1195",
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1195.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update",
"tracking": {
"current_release_date": "2025-11-21T18:21:33+00:00",
"generator": {
"date": "2025-11-21T18:21:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1195",
"initial_release_date": "2021-04-14T14:48:19+00:00",
"revision_history": [
{
"date": "2021-04-14T14:48:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T14:48:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el8jws?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-4.redhat_4.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el8jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-4.redhat_4.el8jws?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:48:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:48:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1199
Vulnerability from csaf_redhat - Published: 2021-04-14 15:56 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 7 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1199",
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1199.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 security update",
"tracking": {
"current_release_date": "2024-11-22T16:40:55+00:00",
"generator": {
"date": "2024-11-22T16:40:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1199",
"initial_release_date": "2021-04-14T15:56:54+00:00",
"revision_history": [
{
"date": "2021-04-14T15:56:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T15:56:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-6.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-20.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-37.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-5.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-70.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-33.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-14.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-60.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-13.redhat_1.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-20.Final_redhat_2.jbcs.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-20.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-20.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-5.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-5.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-70.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-70.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-33.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-33.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-14.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-14.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-60.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-60.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-20.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-20.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-70.jbcs.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:56:54+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:56:54+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1196
Vulnerability from csaf_redhat - Published: 2021-04-14 14:34 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 5.4.2 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.2 serves as a replacement for Red Hat JBoss Web Server 5.4.1, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1196",
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1196.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update",
"tracking": {
"current_release_date": "2025-11-21T18:21:31+00:00",
"generator": {
"date": "2025-11-21T18:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1196",
"initial_release_date": "2021-04-14T14:34:26+00:00",
"revision_history": [
{
"date": "2021-04-14T14:34:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T14:34:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5",
"product": {
"name": "Red Hat JBoss Web Server 5",
"product_id": "Red Hat JBoss Web Server 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:34:26+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:34:26+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1131
Vulnerability from csaf_redhat - Published: 2021-04-07 15:34 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1131",
"url": "https://access.redhat.com/errata/RHSA-2021:1131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1131.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T16:40:26+00:00",
"generator": {
"date": "2024-11-22T16:40:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1131",
"initial_release_date": "2021-04-07T15:34:17+00:00",
"revision_history": [
{
"date": "2021-04-07T15:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-07T15:34:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.src",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.src",
"product_id": "openssl-1:1.1.1c-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-07T15:34:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1131"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
}
]
}
RHSA-2021_1195
Vulnerability from csaf_redhat - Published: 2021-04-14 14:48 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Red Hat JBoss Web Server 5.4.2 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.2 serves as a replacement for Red Hat JBoss Web Server 5.4.1, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1195",
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1195.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update",
"tracking": {
"current_release_date": "2024-11-22T16:40:48+00:00",
"generator": {
"date": "2024-11-22T16:40:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1195",
"initial_release_date": "2021-04-14T14:48:19+00:00",
"revision_history": [
{
"date": "2021-04-14T14:48:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T14:48:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el8jws?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-4.redhat_4.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-4.redhat_4.el8jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-4.redhat_4.el8jws?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:48:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:48:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1195"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el7jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-4.redhat_4.el8jws.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1199
Vulnerability from csaf_redhat - Published: 2021-04-14 15:56 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 7 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1199",
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1199.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:31+00:00",
"generator": {
"date": "2025-11-21T18:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1199",
"initial_release_date": "2021-04-14T15:56:54+00:00",
"revision_history": [
{
"date": "2021-04-14T15:56:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T15:56:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-6.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-20.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-37.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-5.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-70.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-33.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-14.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-60.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-13.redhat_1.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-20.Final_redhat_2.jbcs.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-6.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-20.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-20.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-37.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-5.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-5.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-70.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-70.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-70.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-33.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-33.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-14.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-14.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-60.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-60.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-13.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-20.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-20.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-70.jbcs.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:56:54+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:56:54+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1199"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-70.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-20.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-14.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-13.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-33.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-60.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-70.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-37.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-5.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-6.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-20.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-6.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1131
Vulnerability from csaf_redhat - Published: 2021-04-07 15:34 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1131",
"url": "https://access.redhat.com/errata/RHSA-2021:1131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1131.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:27+00:00",
"generator": {
"date": "2025-11-21T18:21:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1131",
"initial_release_date": "2021-04-07T15:34:17+00:00",
"revision_history": [
{
"date": "2021-04-07T15:34:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-07T15:34:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.src",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.src",
"product_id": "openssl-1:1.1.1c-5.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-5.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-07T15:34:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1131"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-5.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
}
]
}
RHSA-2021_1024
Vulnerability from csaf_redhat - Published: 2021-03-30 14:40 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1024",
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1024.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T16:40:13+00:00",
"generator": {
"date": "2024-11-22T16:40:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1024",
"initial_release_date": "2021-03-30T14:40:51+00:00",
"revision_history": [
{
"date": "2021-03-30T14:40:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-30T14:40:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.src",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.src",
"product_id": "openssl-1:1.1.1g-15.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.src",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T14:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T14:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1202
Vulnerability from csaf_redhat - Published: 2021-04-14 18:02 - Updated: 2024-11-22 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 12 serves as a replacement for Red Hat JBoss Web Server 3.1.11, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1202",
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1202.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update",
"tracking": {
"current_release_date": "2024-11-22T16:41:09+00:00",
"generator": {
"date": "2024-11-22T16:41:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1202",
"initial_release_date": "2021-04-14T18:02:04+00:00",
"revision_history": [
{
"date": "2021-04-14T18:02:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T18:02:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:41:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product": {
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product_id": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-24.redhat_24.ep7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_id": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-24.redhat_24.ep7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.23-24.redhat_24.ep7.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src"
},
"product_reference": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T18:02:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T18:02:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1200
Vulnerability from csaf_redhat - Published: 2021-04-14 15:59 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 7 zip release for RHEL 7, RHEL 8 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 7 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: NULL pointer deref in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1200",
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1200.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:31+00:00",
"generator": {
"date": "2025-11-21T18:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1200",
"initial_release_date": "2021-04-14T15:59:58+00:00",
"revision_history": [
{
"date": "2021-04-14T15:59:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T15:59:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBCS 2.4.37 SP7",
"product": {
"name": "JBCS 2.4.37 SP7",
"product_id": "JBCS 2.4.37 SP7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:59:58+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"JBCS 2.4.37 SP7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:59:58+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"JBCS 2.4.37 SP7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1200
Vulnerability from csaf_redhat - Published: 2021-04-14 15:59 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 7 zip release for RHEL 7, RHEL 8 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 7 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: NULL pointer deref in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1200",
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1200.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 security update",
"tracking": {
"current_release_date": "2024-11-22T16:40:41+00:00",
"generator": {
"date": "2024-11-22T16:40:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1200",
"initial_release_date": "2021-04-14T15:59:58+00:00",
"revision_history": [
{
"date": "2021-04-14T15:59:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T15:59:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBCS 2.4.37 SP7",
"product": {
"name": "JBCS 2.4.37 SP7",
"product_id": "JBCS 2.4.37 SP7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:59:58+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"JBCS 2.4.37 SP7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T15:59:58+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1200"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"JBCS 2.4.37 SP7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1063
Vulnerability from csaf_redhat - Published: 2021-04-05 13:48 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1063",
"url": "https://access.redhat.com/errata/RHSA-2021:1063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1063.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:21+00:00",
"generator": {
"date": "2025-11-21T18:21:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1063",
"initial_release_date": "2021-04-05T13:48:26+00:00",
"revision_history": [
{
"date": "2021-04-05T13:48:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-05T13:48:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.src",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.src",
"product_id": "openssl-1:1.1.1c-18.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-05T13:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1063"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
}
]
}
RHSA-2021:1024
Vulnerability from csaf_redhat - Published: 2021-03-30 14:40 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1024",
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1024.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:18+00:00",
"generator": {
"date": "2025-11-21T18:21:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1024",
"initial_release_date": "2021-03-30T14:40:51+00:00",
"revision_history": [
{
"date": "2021-03-30T14:40:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-30T14:40:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.src",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.src",
"product_id": "openssl-1:1.1.1g-15.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-15.el8_3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.src",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-15.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1g-15.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T14:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-30T14:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1024"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-15.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-15.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1196
Vulnerability from csaf_redhat - Published: 2021-04-14 14:34 - Updated: 2024-11-22 16:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 5.4.2 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.2 serves as a replacement for Red Hat JBoss Web Server 5.4.1, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1196",
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1196.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update",
"tracking": {
"current_release_date": "2024-11-22T16:41:16+00:00",
"generator": {
"date": "2024-11-22T16:41:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1196",
"initial_release_date": "2021-04-14T14:34:26+00:00",
"revision_history": [
{
"date": "2021-04-14T14:34:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T14:34:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:41:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5",
"product": {
"name": "Red Hat JBoss Web Server 5",
"product_id": "Red Hat JBoss Web Server 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:34:26+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T14:34:26+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1196"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1202
Vulnerability from csaf_redhat - Published: 2021-04-14 18:02 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 12 serves as a replacement for Red Hat JBoss Web Server 3.1.11, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1202",
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1202.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:32+00:00",
"generator": {
"date": "2025-11-21T18:21:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1202",
"initial_release_date": "2021-04-14T18:02:04+00:00",
"revision_history": [
{
"date": "2021-04-14T18:02:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T18:02:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product": {
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product_id": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-24.redhat_24.ep7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_id": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-24.redhat_24.ep7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.23-24.redhat_24.ep7.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src"
},
"product_reference": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T18:02:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T18:02:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1202"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-24.redhat_24.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-24.redhat_24.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1189
Vulnerability from csaf_redhat - Published: 2021-04-14 11:42 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nChanges to the redhat-release-virtualization-host component:\n\n* Previously, the redhat-support-tool was missing from the RHV-H 4.4 package. \nIn this release, the redhat-support-tool has been added. (BZ#1928607)\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1189",
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1892573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892573"
},
{
"category": "external",
"summary": "1895832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895832"
},
{
"category": "external",
"summary": "1907306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907306"
},
{
"category": "external",
"summary": "1907358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907358"
},
{
"category": "external",
"summary": "1907746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907746"
},
{
"category": "external",
"summary": "1918207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918207"
},
{
"category": "external",
"summary": "1927395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927395"
},
{
"category": "external",
"summary": "1928607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928607"
},
{
"category": "external",
"summary": "1940845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940845"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "1942040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942040"
},
{
"category": "external",
"summary": "1942498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942498"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1189.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:21:29+00:00",
"generator": {
"date": "2025-11-21T18:21:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1189",
"initial_release_date": "2021-04-14T11:42:19+00:00",
"revision_history": [
{
"date": "2021-04-14T11:42:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T11:42:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product_id": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.50-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "zip-0:3.0-23.el8.src",
"product": {
"name": "zip-0:3.0-23.el8.src",
"product_id": "zip-0:3.0-23.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip@3.0-23.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "gcc-0:8.3.1-5.1.el8.src",
"product": {
"name": "gcc-0:8.3.1-5.1.el8.src",
"product_id": "gcc-0:8.3.1-5.1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc@8.3.1-5.1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "make-1:4.2.1-10.el8.src",
"product": {
"name": "make-1:4.2.1-10.el8.src",
"product_id": "make-1:4.2.1-10.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make@4.2.1-10.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dyninst-0:10.1.0-4.el8.src",
"product": {
"name": "dyninst-0:10.1.0-4.el8.src",
"product_id": "dyninst-0:10.1.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst@10.1.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "isl-0:0.16.1-6.el8.src",
"product": {
"name": "isl-0:0.16.1-6.el8.src",
"product_id": "isl-0:0.16.1-6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl@0.16.1-6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libmpc-0:1.0.2-9.el8.src",
"product": {
"name": "libmpc-0:1.0.2-9.el8.src",
"product_id": "libmpc-0:1.0.2-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc@1.0.2-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-0:4.1.1-4.el8.src",
"product": {
"name": "libxcrypt-0:4.1.1-4.el8.src",
"product_id": "libxcrypt-0:4.1.1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt@4.1.1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.66.0-10.el8.src",
"product": {
"name": "boost-0:1.66.0-10.el8.src",
"product_id": "boost-0:1.66.0-10.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.66.0-10.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "tbb-0:2018.2-9.el8.src",
"product": {
"name": "tbb-0:2018.2-9.el8.src",
"product_id": "tbb-0:2018.2-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb@2018.2-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.18-0.1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.18-0.1.el8ev.src",
"product_id": "imgbased-0:1.2.18-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.18-0.1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.5-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product_id": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.5-20210330.0.el8_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.50-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_id": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.18-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.18-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.5-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.5-20210330.0.el8_3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product": {
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product_id": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.0.1763-15.el8?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "zip-0:3.0-23.el8.x86_64",
"product": {
"name": "zip-0:3.0-23.el8.x86_64",
"product_id": "zip-0:3.0-23.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip@3.0-23.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "zip-debugsource-0:3.0-23.el8.x86_64",
"product": {
"name": "zip-debugsource-0:3.0-23.el8.x86_64",
"product_id": "zip-debugsource-0:3.0-23.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip-debugsource@3.0-23.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cpp-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "cpp-0:8.3.1-5.1.el8.x86_64",
"product_id": "cpp-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cpp@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcc@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-debugsource@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cpp-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-c%2B%2B-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-gdb-plugin-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-gfortran-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-offload-nvptx-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-plugin-devel-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libasan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libatomic-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcc-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgfortran-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp-offload-nvptx-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libitm-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/liblsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libquadmath-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libstdc%2B%2B-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libubsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "make-1:4.2.1-10.el8.x86_64",
"product": {
"name": "make-1:4.2.1-10.el8.x86_64",
"product_id": "make-1:4.2.1-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make@4.2.1-10.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product": {
"name": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product_id": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make-debugsource@4.2.1-10.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dyninst-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-debugsource@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-devel-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-testsuite-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "isl-0:0.16.1-6.el8.x86_64",
"product": {
"name": "isl-0:0.16.1-6.el8.x86_64",
"product_id": "isl-0:0.16.1-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl@0.16.1-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product": {
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product_id": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl-debugsource@0.16.1-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc-debugsource@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product": {
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_id": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/compat-libmpc-debuginfo@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc-debuginfo@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product": {
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product_id": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt-devel@4.1.1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product": {
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product_id": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt-debugsource@4.1.1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product_id": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-date-time@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product_id": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-filesystem@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-system-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-system-0:1.66.0-10.el8.x86_64",
"product_id": "boost-system-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-system@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-timer-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-timer-0:1.66.0-10.el8.x86_64",
"product_id": "boost-timer-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-timer@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product_id": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debugsource@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-atomic-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-chrono-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-container-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-context-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-coroutine-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-date-time-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doctools-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-fiber-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-filesystem-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-mpich-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-openmpi-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-iostreams-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-locale-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-log-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-math-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-mpich-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-mpich-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-numpy3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-openmpi-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-openmpi-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-program-options-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-random-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-regex-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-serialization-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-signals-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-stacktrace-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-system-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-test-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-thread-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-timer-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-type_erasure-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-wave-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tbb-0:2018.2-9.el8.x86_64",
"product": {
"name": "tbb-0:2018.2-9.el8.x86_64",
"product_id": "tbb-0:2018.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb@2018.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product": {
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product_id": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb-debugsource@2018.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.5-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-common-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-common-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.66.0-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src"
},
"product_reference": "boost-0:1.66.0-10.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-date-time-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-date-time-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-system-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-system-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-timer-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-timer-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64"
},
"product_reference": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "cpp-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-0:10.1.0-4.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src"
},
"product_reference": "dyninst-0:10.1.0-4.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-0:8.3.1-5.1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src"
},
"product_reference": "gcc-0:8.3.1-5.1.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-0:0.16.1-6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src"
},
"product_reference": "isl-0:0.16.1-6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-0:0.16.1-6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64"
},
"product_reference": "isl-0:0.16.1-6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64"
},
"product_reference": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcc-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgcc-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-0:1.0.2-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src"
},
"product_reference": "libmpc-0:1.0.2-9.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-0:4.1.1-4.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src"
},
"product_reference": "libxcrypt-0:4.1.1-4.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64"
},
"product_reference": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64"
},
"product_reference": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-1:4.2.1-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src"
},
"product_reference": "make-1:4.2.1-10.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-1:4.2.1-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64"
},
"product_reference": "make-1:4.2.1-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-debugsource-1:4.2.1-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64"
},
"product_reference": "make-debugsource-1:4.2.1-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-0:2018.2-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src"
},
"product_reference": "tbb-0:2018.2-9.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-0:2018.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64"
},
"product_reference": "tbb-0:2018.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64"
},
"product_reference": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-0:3.0-23.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src"
},
"product_reference": "zip-0:3.0-23.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-0:3.0-23.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64"
},
"product_reference": "zip-0:3.0-23.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-debugsource-0:3.0-23.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64"
},
"product_reference": "zip-debugsource-0:3.0-23.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.18-0.1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.18-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.50-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.50-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:42:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nThe system must be rebooted for this update to take effect. For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:42:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nThe system must be rebooted for this update to take effect. For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1189
Vulnerability from csaf_redhat - Published: 2021-04-14 11:42 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nChanges to the redhat-release-virtualization-host component:\n\n* Previously, the redhat-support-tool was missing from the RHV-H 4.4 package. \nIn this release, the redhat-support-tool has been added. (BZ#1928607)\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1189",
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1892573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892573"
},
{
"category": "external",
"summary": "1895832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895832"
},
{
"category": "external",
"summary": "1907306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907306"
},
{
"category": "external",
"summary": "1907358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907358"
},
{
"category": "external",
"summary": "1907746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907746"
},
{
"category": "external",
"summary": "1918207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918207"
},
{
"category": "external",
"summary": "1927395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927395"
},
{
"category": "external",
"summary": "1928607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928607"
},
{
"category": "external",
"summary": "1940845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940845"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "1942040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942040"
},
{
"category": "external",
"summary": "1942498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942498"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1189.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T16:40:33+00:00",
"generator": {
"date": "2024-11-22T16:40:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1189",
"initial_release_date": "2021-04-14T11:42:19+00:00",
"revision_history": [
{
"date": "2021-04-14T11:42:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T11:42:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product_id": "scap-security-guide-0:0.1.50-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.50-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "zip-0:3.0-23.el8.src",
"product": {
"name": "zip-0:3.0-23.el8.src",
"product_id": "zip-0:3.0-23.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip@3.0-23.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "gcc-0:8.3.1-5.1.el8.src",
"product": {
"name": "gcc-0:8.3.1-5.1.el8.src",
"product_id": "gcc-0:8.3.1-5.1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc@8.3.1-5.1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "make-1:4.2.1-10.el8.src",
"product": {
"name": "make-1:4.2.1-10.el8.src",
"product_id": "make-1:4.2.1-10.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make@4.2.1-10.el8?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dyninst-0:10.1.0-4.el8.src",
"product": {
"name": "dyninst-0:10.1.0-4.el8.src",
"product_id": "dyninst-0:10.1.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst@10.1.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "isl-0:0.16.1-6.el8.src",
"product": {
"name": "isl-0:0.16.1-6.el8.src",
"product_id": "isl-0:0.16.1-6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl@0.16.1-6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libmpc-0:1.0.2-9.el8.src",
"product": {
"name": "libmpc-0:1.0.2-9.el8.src",
"product_id": "libmpc-0:1.0.2-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc@1.0.2-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-0:4.1.1-4.el8.src",
"product": {
"name": "libxcrypt-0:4.1.1-4.el8.src",
"product_id": "libxcrypt-0:4.1.1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt@4.1.1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "boost-0:1.66.0-10.el8.src",
"product": {
"name": "boost-0:1.66.0-10.el8.src",
"product_id": "boost-0:1.66.0-10.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost@1.66.0-10.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "tbb-0:2018.2-9.el8.src",
"product": {
"name": "tbb-0:2018.2-9.el8.src",
"product_id": "tbb-0:2018.2-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb@2018.2-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.18-0.1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.18-0.1.el8ev.src",
"product_id": "imgbased-0:1.2.18-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.18-0.1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.5-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product_id": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.5-20210330.0.el8_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.50-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_id": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.18-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.18-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.5-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.5-20210330.0.el8_3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product": {
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product_id": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.0.1763-15.el8?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "zip-0:3.0-23.el8.x86_64",
"product": {
"name": "zip-0:3.0-23.el8.x86_64",
"product_id": "zip-0:3.0-23.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip@3.0-23.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "zip-debugsource-0:3.0-23.el8.x86_64",
"product": {
"name": "zip-debugsource-0:3.0-23.el8.x86_64",
"product_id": "zip-debugsource-0:3.0-23.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/zip-debugsource@3.0-23.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cpp-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "cpp-0:8.3.1-5.1.el8.x86_64",
"product_id": "cpp-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cpp@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgcc-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcc@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-debugsource@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cpp-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-c%2B%2B-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-gdb-plugin-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-gfortran-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-offload-nvptx-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gcc-plugin-devel-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libasan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libatomic-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcc-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgfortran-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgomp-offload-nvptx-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libitm-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/liblsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libquadmath-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libstdc%2B%2B-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product": {
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_id": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libubsan-debuginfo@8.3.1-5.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "make-1:4.2.1-10.el8.x86_64",
"product": {
"name": "make-1:4.2.1-10.el8.x86_64",
"product_id": "make-1:4.2.1-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make@4.2.1-10.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product": {
"name": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product_id": "make-debugsource-1:4.2.1-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/make-debugsource@4.2.1-10.el8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dyninst-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-debugsource@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-devel-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product": {
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product_id": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dyninst-testsuite-debuginfo@10.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product_id": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.28-127.el8_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "isl-0:0.16.1-6.el8.x86_64",
"product": {
"name": "isl-0:0.16.1-6.el8.x86_64",
"product_id": "isl-0:0.16.1-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl@0.16.1-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product": {
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product_id": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/isl-debugsource@0.16.1-6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc-debugsource@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product": {
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_id": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/compat-libmpc-debuginfo@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product": {
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_id": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libmpc-debuginfo@1.0.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product": {
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product_id": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt-devel@4.1.1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product": {
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product_id": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxcrypt-debugsource@4.1.1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product_id": "boost-date-time-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-date-time@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product_id": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-filesystem@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-system-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-system-0:1.66.0-10.el8.x86_64",
"product_id": "boost-system-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-system@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-timer-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-timer-0:1.66.0-10.el8.x86_64",
"product_id": "boost-timer-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-timer@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product_id": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debugsource@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-atomic-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-chrono-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-container-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-context-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-coroutine-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-date-time-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-doctools-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-fiber-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-filesystem-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-mpich-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-graph-openmpi-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-iostreams-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-locale-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-log-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-math-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-mpich-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-mpich-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-numpy3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-openmpi-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-openmpi-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-program-options-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-python3-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-random-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-regex-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-serialization-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-signals-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-stacktrace-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-system-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-test-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-thread-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-timer-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-type_erasure-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product": {
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product_id": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/boost-wave-debuginfo@1.66.0-10.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tbb-0:2018.2-9.el8.x86_64",
"product": {
"name": "tbb-0:2018.2-9.el8.x86_64",
"product_id": "tbb-0:2018.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb@2018.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product": {
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product_id": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tbb-debugsource@2018.2-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.5-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-common-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-common-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-15.el8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-0:1.66.0-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src"
},
"product_reference": "boost-0:1.66.0-10.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-date-time-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-date-time-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-debugsource-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-debugsource-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-filesystem-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-filesystem-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-system-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-system-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-timer-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-timer-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64"
},
"product_reference": "boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64"
},
"product_reference": "compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "cpp-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-0:10.1.0-4.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src"
},
"product_reference": "dyninst-0:10.1.0-4.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-debugsource-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64"
},
"product_reference": "dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-0:8.3.1-5.1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src"
},
"product_reference": "gcc-0:8.3.1-5.1.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-devel-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.28-127.el8_3.2.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64"
},
"product_reference": "glibc-headers-0:2.28-127.el8_3.2.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-0:0.16.1-6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src"
},
"product_reference": "isl-0:0.16.1-6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-0:0.16.1-6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64"
},
"product_reference": "isl-0:0.16.1-6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "isl-debugsource-0:0.16.1-6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64"
},
"product_reference": "isl-debugsource-0:0.16.1-6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcc-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgcc-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-0:1.0.2-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src"
},
"product_reference": "libmpc-0:1.0.2-9.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmpc-debugsource-0:1.0.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64"
},
"product_reference": "libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64"
},
"product_reference": "libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-0:4.1.1-4.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src"
},
"product_reference": "libxcrypt-0:4.1.1-4.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64"
},
"product_reference": "libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxcrypt-devel-0:4.1.1-4.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64"
},
"product_reference": "libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-1:4.2.1-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src"
},
"product_reference": "make-1:4.2.1-10.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-1:4.2.1-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64"
},
"product_reference": "make-1:4.2.1-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "make-debugsource-1:4.2.1-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64"
},
"product_reference": "make-debugsource-1:4.2.1-10.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "perf-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-0:2018.2-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src"
},
"product_reference": "tbb-0:2018.2-9.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-0:2018.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64"
},
"product_reference": "tbb-0:2018.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tbb-debugsource-0:2018.2-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64"
},
"product_reference": "tbb-debugsource-0:2018.2-9.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-15.el8.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-15.el8.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-0:3.0-23.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src"
},
"product_reference": "zip-0:3.0-23.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-0:3.0-23.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64"
},
"product_reference": "zip-0:3.0-23.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zip-debugsource-0:3.0-23.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64"
},
"product_reference": "zip-debugsource-0:3.0-23.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.18-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.18-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.18-0.1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.18-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.50-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.50-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:42:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nThe system must be rebooted for this update to take effect. For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T11:42:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nThe system must be rebooted for this update to take effect. For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1189"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"8Base-RHV-Hypervisor-4:boost-0:1.66.0-10.el8.src",
"8Base-RHV-Hypervisor-4:boost-atomic-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-chrono-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-container-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-context-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-coroutine-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-date-time-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-debugsource-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-doctools-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-fiber-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-filesystem-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-graph-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-iostreams-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-locale-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-log-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-math-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-mpich-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-numpy3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-openmpi-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-program-options-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-python3-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-random-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-regex-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-serialization-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-signals-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-stacktrace-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-system-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-test-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-thread-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-timer-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-type_erasure-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:boost-wave-debuginfo-0:1.66.0-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:compat-libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:cpp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.src",
"8Base-RHV-Hypervisor-4:dyninst-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-debugsource-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-devel-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:dyninst-testsuite-debuginfo-0:10.1.0-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.src",
"8Base-RHV-Hypervisor-4:gcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-c++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-debugsource-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gdb-plugin-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-gfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:gcc-plugin-devel-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-debuginfo-common-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-devel-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:glibc-headers-0:2.28-127.el8_3.2.x86_64",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.src",
"8Base-RHV-Hypervisor-4:isl-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:isl-debugsource-0:0.16.1-6.el8.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:libasan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libatomic-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgcc-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgfortran-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libgomp-offload-nvptx-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libitm-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:liblsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.src",
"8Base-RHV-Hypervisor-4:libmpc-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debuginfo-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libmpc-debugsource-0:1.0.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:libquadmath-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libstdc++-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libtsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libubsan-debuginfo-0:8.3.1-5.1.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-0:4.1.1-4.el8.src",
"8Base-RHV-Hypervisor-4:libxcrypt-debugsource-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:libxcrypt-devel-0:4.1.1-4.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.src",
"8Base-RHV-Hypervisor-4:make-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:make-debugsource-1:4.2.1-10.el8.x86_64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.src",
"8Base-RHV-Hypervisor-4:tbb-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:tbb-debugsource-0:2018.2-9.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-X11-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-common-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-debugsource-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-enhanced-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:vim-filesystem-2:8.0.1763-15.el8.noarch",
"8Base-RHV-Hypervisor-4:vim-minimal-debuginfo-2:8.0.1763-15.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.src",
"8Base-RHV-Hypervisor-4:zip-0:3.0-23.el8.x86_64",
"8Base-RHV-Hypervisor-4:zip-debugsource-0:3.0-23.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.18-0.1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.18-0.1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.5-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.5-4.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.50-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.50-1.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.5-20210330.0.el8_3.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.5-20210330.0.el8_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021:1203
Vulnerability from csaf_redhat - Published: 2021-04-14 17:57 - Updated: 2025-11-21 18:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 7 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 12 serves as a replacement for Red Hat JBoss Web Server 3.1.11, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1203",
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1203.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update",
"tracking": {
"current_release_date": "2025-11-21T18:21:32+00:00",
"generator": {
"date": "2025-11-21T18:21:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1203",
"initial_release_date": "2021-04-14T17:57:20+00:00",
"revision_history": [
{
"date": "2021-04-14T17:57:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T17:57:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:21:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1",
"product": {
"name": "Red Hat JBoss Web Server 3.1",
"product_id": "Red Hat JBoss Web Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T17:57:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL Project"
]
},
{
"names": [
"Benjamin Kaduk"
],
"summary": "Acknowledged by upstream."
},
{
"names": [
"Xiang Ding and others"
],
"organization": "Akamai",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941547"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects openssl 1.1.1h and above only, older versions are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "RHBZ#1941547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T17:57:20+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1203"
},
{
"category": "workaround",
"details": "The following conditions have to be met for an application compiled with OpenSSL to be vulnerable:\n\n- the CA trusted by the system must issue or have issued certificates that don\u0027t include basic Key Usage extension.\n- the CA certificates must not have path length constraint set to a value that would limit the certificate chain to just the subscriber certificates (i.e. CA certificate just above the subscriber cert must not have 0 as the path length constraint, and any CA above it must not have it increase by more than 1 for every level in the hierarchy)\n- the attacker needs to have access to such subscriber certificate (without basic Key Usage and linking up to CAs without path length constraints or not effectively constraining certs issued by this certificate)\n- the application under attack must use the X509_V_FLAG_X509_STRICT flag and must not set purpose for the certificate verification\n\nif any of the above conditions are not met then the application compiled with OpenSSL is not vulnerable to the CVE.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT"
}
]
}
RHSA-2021_1063
Vulnerability from csaf_redhat - Published: 2021-04-05 13:48 - Updated: 2024-11-22 16:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1063",
"url": "https://access.redhat.com/errata/RHSA-2021:1063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1063.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T16:40:20+00:00",
"generator": {
"date": "2024-11-22T16:40:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1063",
"initial_release_date": "2021-04-05T13:48:26+00:00",
"revision_history": [
{
"date": "2021-04-05T13:48:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-05T13:48:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:40:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.src",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.src",
"product_id": "openssl-1:1.1.1c-18.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-18.el8_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-18.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-18.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"Nokia"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2021-3449",
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941554"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: NULL pointer dereference in signature_algorithms processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects OpenSSL 1.1.1, older versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "RHBZ#1941554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20210325.txt",
"url": "https://www.openssl.org/news/secadv/20210325.txt"
}
],
"release_date": "2021-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-05T13:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1063"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by disabling TLS renegotiation on servers compiled with OpenSSL. It is enabled by default, but can be disabled for servers which do not require it and can be used to mitigate this flaw. Versions of httpd package shipped with Red Hat Enterprise Linux 8 have TLS renegotiation disabled by default.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-18.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-18.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: NULL pointer dereference in signature_algorithms processing"
}
]
}
SSA-772220
Vulnerability from csaf_siemens - Published: 2021-07-13 00:00 - Updated: 2024-01-09 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenSSL has published a security advisory [0] about a vulnerability in OpenSSL versions 1.1.1 \u003c 1.1.1k, that allows\nan unauthenticated attacker to cause a Denial-of-Service (DoS) if a maliciously crafted renegotiation message is sent.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends countermeasures for products where fixes are not, or not yet available.\n\n[0] \nhttps://www.openssl.org/news/secadv/20210325.txt",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"category": "self",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-772220.json"
},
{
"category": "self",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf"
},
{
"category": "self",
"summary": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-772220.txt"
}
],
"title": "SSA-772220: OpenSSL Vulnerabilities in Industrial Products",
"tracking": {
"current_release_date": "2024-01-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-772220",
"initial_release_date": "2021-07-13T00:00:00Z",
"revision_history": [
{
"date": "2021-07-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-08-10T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed RUGGEDCOM CloudConnect APE/VPE as it is not affected, added solution for SIMATIC NET CP 1543-1"
},
{
"date": "2021-09-14T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added solution for SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC PCS neo, SIMATIC Process Historian OPC UA Server, SINEMA Server, and TIA Administrator, removed SIMATIC HMI Basic Panels 2nd Generation as the product is not affected"
},
{
"date": "2021-11-09T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added solution for SCALANCE SC-600, SIMATIC WinCC Runtime Advanced, SIMATIC CP 1242-7 GPRS V2, SIMATIC CP 1243-7 LTE and SIMATIC Cloud Connect 7; split SCALANCE SC-600 into individual products; removed SINEC PNI as it is not affected"
},
{
"date": "2021-12-14T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added solution for SIMATIC MV500 family and SINUMERIK OPC UA Server"
},
{
"date": "2022-01-11T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added solution for SIMATIC HMI Panels, SIMATIC Logon and SIMATIC PDM, clarified that no remediation is planned for SCALANCE W-700 IEEE 802.11n family"
},
{
"date": "2022-02-08T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added solution for SCALANCE LPE9403; clarified that no remediation is planned for SCALANCE W-1700 IEEE 802.11ac family; added RUGGEDCOM CROSSBOW Station Access Controller as affected product ; fixed affected versions for SINEC NMS"
},
{
"date": "2022-02-17T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added solution for SIMATIC S7-1200 CPU family"
},
{
"date": "2022-04-12T00:00:00Z",
"legacy_version": "1.8",
"number": "9",
"summary": "No fix planned for SINAMICS Connect 300; Added solution for SCALANCE M-800 / S615 family, RUGGEDCOM RM1224, and SCALANCE W-1700 IEEE 802.11ac family; Added SIMATIC RF600R family"
},
{
"date": "2022-05-10T00:00:00Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Added solution for SIMATIC READER RF1xxC family and SIMATIC Reader RF360R and SIMATIC PCS 7 TeleControl"
},
{
"date": "2022-06-14T00:00:00Z",
"legacy_version": "2.0",
"number": "11",
"summary": "Added fix for SIMATIC CP 1545-1"
},
{
"date": "2022-08-09T00:00:00Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Added or corrected fix information for SIMATIC CP 1242-7 V2, CP 1243-7, CP 1243-1, CP 1243-8"
},
{
"date": "2023-03-14T00:00:00Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Updated fix information for RUGGEDCOM CROSSBOW SAC, added fix for SIMATIC CP 1542SP-1 IRC, and SIMATIC CP 1543SP-1"
},
{
"date": "2024-01-09T00:00:00Z",
"legacy_version": "2.3",
"number": "14",
"summary": "Added fix for SIMATIC WinCC TeleControl"
}
],
"status": "interim",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003e= V5.2.0 \u003c V5.3 only when running on ROX II V2.14.0",
"product": {
"name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1",
"product": {
"name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK5998-3GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V4.1",
"product": {
"name": "SCALANCE S602",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V4.1",
"product": {
"name": "SCALANCE S612",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.2\u003cV7.1",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V4.1",
"product": {
"name": "SCALANCE S623",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V4.1",
"product": {
"name": "SCALANCE S627-2M",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.1.4",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)",
"product_id": "22",
"product_identification_helper": {
"model_numbers": [
"6GK5622-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.1.4",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)",
"product_id": "23",
"product_identification_helper": {
"model_numbers": [
"6GK5632-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.1.4",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)",
"product_id": "24",
"product_identification_helper": {
"model_numbers": [
"6GK5636-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.1.4",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)",
"product_id": "25",
"product_identification_helper": {
"model_numbers": [
"6GK5642-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.1.4",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)",
"product_id": "26",
"product_identification_helper": {
"model_numbers": [
"6GK5646-2GS00-2AC2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "27",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "28",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "29",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "30",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "31",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV3.0",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "32",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V6.5",
"product": {
"name": "SCALANCE W-700 IEEE 802.11n family",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.3",
"product": {
"name": "SCALANCE XB-200",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "SCALANCE XB-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.3",
"product": {
"name": "SCALANCE XC-200",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "SCALANCE XC-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.3",
"product": {
"name": "SCALANCE XF-200BA",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "SCALANCE XF-200BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV6.4",
"product": {
"name": "SCALANCE XM-400",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.3",
"product": {
"name": "SCALANCE XP-200",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "SCALANCE XP-200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.3",
"product": {
"name": "SCALANCE XR-300WG",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-300WG"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV6.4",
"product": {
"name": "SCALANCE XR-500 Family",
"product_id": "40"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V1.1\u003cV1.6",
"product": {
"name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)",
"product_id": "41",
"product_identification_helper": {
"model_numbers": [
"6GK1411-1AC00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V1.1\u003cV1.6",
"product": {
"name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)",
"product_id": "42",
"product_identification_helper": {
"model_numbers": [
"6GK1411-5AC00"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)",
"product_id": "43",
"product_identification_helper": {
"model_numbers": [
"6GK7242-7KX31-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)",
"product_id": "44",
"product_identification_helper": {
"model_numbers": [
"6GK7243-1BX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)",
"product_id": "45",
"product_identification_helper": {
"model_numbers": [
"6GK7243-7KX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)",
"product_id": "46",
"product_identification_helper": {
"model_numbers": [
"6GK7243-7SX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)",
"product_id": "47",
"product_identification_helper": {
"model_numbers": [
"6GK7243-8RX30-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.1\u003cV2.2.28",
"product": {
"name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)",
"product_id": "48",
"product_identification_helper": {
"model_numbers": [
"6GK7542-6VX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.2\u003cV3.0",
"product": {
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)",
"product_id": "49",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1AX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.1\u003cV2.2.28",
"product": {
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)",
"product_id": "50",
"product_identification_helper": {
"model_numbers": [
"6GK7543-6WX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V1.0\u003cV1.1",
"product": {
"name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)",
"product_id": "51",
"product_identification_helper": {
"model_numbers": [
"6GK7545-1GX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI Comfort Outdoor Panels (incl. SIPLUS variants)",
"product_id": "52"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Comfort Outdoor Panels (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI Comfort Panels (incl. SIPLUS variants)",
"product_id": "53"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Comfort Panels (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V17.0 Upd 2",
"product": {
"name": "SIMATIC HMI KTP Mobile Panels",
"product_id": "54"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI KTP Mobile Panels"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003e= V1.6 Upd2 \u003c V1.6 Upd5",
"product": {
"name": "SIMATIC Logon V1.6",
"product_id": "55"
}
}
],
"category": "product_name",
"name": "SIMATIC Logon V1.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10)",
"product_id": "56",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10)",
"product_id": "57",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10)",
"product_id": "58",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10)",
"product_id": "59",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10)",
"product_id": "60",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0LE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10)",
"product_id": "61",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0HE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV9.1",
"product": {
"name": "SIMATIC PCS 7 TeleControl",
"product_id": "62"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 TeleControl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.1",
"product": {
"name": "SIMATIC PCS neo",
"product_id": "63"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS neo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003e= V9.1 SP7 \u003c V9.2 SP1",
"product": {
"name": "SIMATIC PDM",
"product_id": "64"
}
}
],
"category": "product_name",
"name": "SIMATIC PDM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003e= 2019 \u003c 2020 Upd1",
"product": {
"name": "SIMATIC Process Historian OPC UA Server",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "SIMATIC Process Historian OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF166C (6GT2002-0EE20)",
"product_id": "66",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0EE20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF166C (6GT2002-0EE20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF185C (6GT2002-0JE10)",
"product_id": "67",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF185C (6GT2002-0JE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF186C (6GT2002-0JE20)",
"product_id": "68",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF186C (6GT2002-0JE20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF186CI (6GT2002-0JE50)",
"product_id": "69",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE50"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF186CI (6GT2002-0JE50)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF188C (6GT2002-0JE40)",
"product_id": "70",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE40"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF188C (6GT2002-0JE40)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF188CI (6GT2002-0JE60)",
"product_id": "71",
"product_identification_helper": {
"model_numbers": [
"6GT2002-0JE60"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF188CI (6GT2002-0JE60)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SIMATIC RF360R (6GT2801-5BA30)",
"product_id": "72",
"product_identification_helper": {
"model_numbers": [
"6GT2801-5BA30"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF360R (6GT2801-5BA30)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0",
"product": {
"name": "SIMATIC RF610R (6GT2811-6BC10)",
"product_id": "73",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6BC10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF610R (6GT2811-6BC10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0",
"product": {
"name": "SIMATIC RF615R (6GT2811-6CC10)",
"product_id": "74",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6CC10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF615R (6GT2811-6CC10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0",
"product": {
"name": "SIMATIC RF650R (6GT2811-6AB20)",
"product_id": "75",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6AB20"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF650R (6GT2811-6AB20)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0",
"product": {
"name": "SIMATIC RF680R (6GT2811-6AA10)",
"product_id": "76",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6AA10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF680R (6GT2811-6AA10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0",
"product": {
"name": "SIMATIC RF685R (6GT2811-6CA10)",
"product_id": "77",
"product_identification_helper": {
"model_numbers": [
"6GT2811-6CA10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC RF685R (6GT2811-6CA10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.5.2",
"product": {
"name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.9.3",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP family (incl. SIPLUS variant)",
"product_id": "79"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP family (incl. SIPLUS variant)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V17 Update 1",
"product": {
"name": "SIMATIC WinCC Runtime Advanced",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Runtime Advanced"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.5",
"product": {
"name": "SIMATIC WinCC TeleControl",
"product_id": "81"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC TeleControl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SINAMICS Connect 300",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "SINAMICS Connect 300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V1.0.1\u003cV1.0.2",
"product": {
"name": "SINEC NMS",
"product_id": "83"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions V14 \u003c V14 SP3",
"product": {
"name": "SINEMA Server",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "SINEMA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V3.1 SP1",
"product": {
"name": "SINUMERIK OPC UA Server",
"product_id": "85"
}
}
],
"category": "product_name",
"name": "SINUMERIK OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.1\u003cV2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)",
"product_id": "86",
"product_identification_helper": {
"model_numbers": [
"6AG2542-6VX00-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.1\u003cV2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)",
"product_id": "87",
"product_identification_helper": {
"model_numbers": [
"6AG1543-6WX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.1\u003cV2.2.28",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)",
"product_id": "88",
"product_identification_helper": {
"model_numbers": [
"6AG2543-6WX00-4XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)",
"product_id": "89",
"product_identification_helper": {
"model_numbers": [
"6AG1242-7KX31-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.2\u003cV3.0",
"product": {
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)",
"product_id": "90",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1AX00-2XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)",
"product_id": "91",
"product_identification_helper": {
"model_numbers": [
"6AG1243-1BX30-2AX0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V3.1\u003cV3.3.46",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)",
"product_id": "92",
"product_identification_helper": {
"model_numbers": [
"6AG2243-1BX30-1XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.2",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)",
"product_id": "93",
"product_identification_helper": {
"model_numbers": [
"6AG1543-1MX00-7XE0"
]
}
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V1.0 SP4",
"product": {
"name": "TIA Administrator",
"product_id": "94"
}
}
],
"category": "product_name",
"name": "TIA Administrator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=V2.0\u003cV2.2",
"product": {
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)",
"product_id": "95",
"product_identification_helper": {
"model_numbers": [
"6GK7543-1MX00-0XE0"
]
}
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3449",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"33",
"27",
"28",
"29",
"30",
"31",
"32",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80",
"81",
"82",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90",
"91",
"92",
"93",
"94",
"95"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to Remote Access service, if used, to mitigate this issue. This service is disabled by default.",
"product_ids": [
"55"
]
},
{
"category": "mitigation",
"details": "Restrict access to the command interface, if used, to mitigate this issue. This interface is disabled by default.",
"product_ids": [
"64"
]
},
{
"category": "mitigation",
"details": "Update ROX II to V2.14.1 (\nhttps://support.industry.siemens.com/cs/ww/en/view/109800780/) or later version",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "use TLS v1.3 only",
"product_ids": [
"2",
"3",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"19"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"17",
"18",
"20",
"21",
"33",
"82"
]
},
{
"category": "vendor_fix",
"details": "Update to V2.2.28 or later version",
"product_ids": [
"48",
"50",
"86",
"87",
"88"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"63"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109801424/"
},
{
"category": "vendor_fix",
"details": "Update to V7.5 or later version",
"product_ids": [
"81"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814522/"
},
{
"category": "vendor_fix",
"details": "Update to V17.0 Upd 2 or later version",
"product_ids": [
"52",
"53",
"54"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/"
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP2",
"product_ids": [
"83"
]
},
{
"category": "vendor_fix",
"details": "Update to V14 SP3 or later version",
"product_ids": [
"84"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109801374/"
},
{
"category": "vendor_fix",
"details": "Update to V4.5.2 or later version",
"product_ids": [
"78"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109793280/"
},
{
"category": "vendor_fix",
"details": "Update to V4.0 or later version",
"product_ids": [
"73",
"74",
"75",
"76",
"77"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808361"
},
{
"category": "vendor_fix",
"details": "Update to V2.2 or later version",
"product_ids": [
"93",
"95"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109798331"
},
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"51"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109811116/"
},
{
"category": "vendor_fix",
"details": "Update to V17 Update 1 or later version",
"product_ids": [
"80"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109800912"
},
{
"category": "vendor_fix",
"details": "Update to V7.1 or later version",
"product_ids": [
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"19"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109807276"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"66",
"67",
"68",
"69",
"70",
"71"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808633"
},
{
"category": "vendor_fix",
"details": "Update to V3.3.46 or later version",
"product_ids": [
"43",
"44",
"45",
"46",
"47",
"89",
"91",
"92"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109812218"
},
{
"category": "vendor_fix",
"details": "Update to V2.9.3 or later version",
"product_ids": [
"79"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 SP1 or later version",
"product_ids": [
"85"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109801292"
},
{
"category": "vendor_fix",
"details": "Update to V1.6 Upd5 or later version",
"product_ids": [
"55"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109794407/"
},
{
"category": "vendor_fix",
"details": "Update to V9.2 SP 1 or later version",
"product_ids": [
"64"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.0 or later version",
"product_ids": [
"49",
"90"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109800773"
},
{
"category": "vendor_fix",
"details": "Update to V6.4 or later version",
"product_ids": [
"40"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796317"
},
{
"category": "vendor_fix",
"details": "Update to V4.3 or later version",
"product_ids": [
"34",
"35",
"36",
"38",
"39"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109799569"
},
{
"category": "vendor_fix",
"details": "Update to V1.0 SP4 or later version",
"product_ids": [
"94"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/114358/"
},
{
"category": "vendor_fix",
"details": "Update to V9.1 or later version",
"product_ids": [
"62"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/"
},
{
"category": "vendor_fix",
"details": "Update SIMATIC PCS neo to V3.1 or later version\nTo obtain SIMATIC PCS neo V3.1 contact your local support.",
"product_ids": [
"65"
]
},
{
"category": "vendor_fix",
"details": "Update to V6.4 or later version",
"product_ids": [
"37"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109796319"
},
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805118/"
},
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"72"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808759"
},
{
"category": "vendor_fix",
"details": "Update to V2.1.4 or later version",
"product_ids": [
"22",
"23",
"24",
"25",
"26"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109797244"
},
{
"category": "vendor_fix",
"details": "Update to V1.6 or later version",
"product_ids": [
"41",
"42"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109803418/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"56",
"57",
"58",
"59",
"60",
"61"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109804366"
},
{
"category": "vendor_fix",
"details": "Update to V7.1 or later version",
"product_ids": [
"2",
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109807276/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0 or later version",
"product_ids": [
"27",
"28",
"29",
"30",
"31",
"32"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V5.3 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109813558/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"15",
"10",
"94",
"71",
"57",
"39",
"8",
"92",
"30",
"60",
"83",
"70",
"76",
"4",
"62",
"9",
"59",
"87",
"17",
"37",
"69",
"51",
"74",
"23",
"29",
"26",
"36",
"81",
"88",
"19",
"89",
"80",
"2",
"16",
"25",
"75",
"14",
"78",
"52",
"67",
"84",
"7",
"13",
"28",
"6",
"3",
"40",
"72",
"50",
"21",
"31",
"66",
"68",
"54",
"79",
"12",
"43",
"47",
"48",
"34",
"41",
"86",
"82",
"44",
"45",
"61",
"95",
"38",
"55",
"24",
"58",
"64",
"91",
"22",
"35",
"18",
"1",
"63",
"32",
"20",
"27",
"85",
"77",
"33",
"93",
"5",
"42",
"90",
"56",
"46",
"53",
"73",
"49",
"65",
"11"
]
}
],
"title": "CVE-2021-3449"
}
]
}
SSA-389290
Vulnerability from csaf_siemens - Published: 2022-03-08 00:00 - Updated: 2022-03-08 00:00Notes
{
"document": {
"category": "Siemens Security Advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited.",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "71 vulnerabilities in third-party components as Node.js, cURL, SQLite, CivetWeb and DNS(ISC BIND) could allow an attacker to interfere with the affected product in various ways.\n\nSiemens has released an update for SINEC INS and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt"
},
{
"category": "self",
"summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json"
}
],
"title": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS",
"tracking": {
"current_release_date": "2022-03-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-389290",
"initial_release_date": "2022-03-08T00:00:00Z",
"revision_history": [
{
"date": "2022-03-08T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V1.0.1.1",
"product": {
"name": "SINEC INS",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SINEC INS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-19242",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19242 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19242 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19242"
},
{
"cve": "CVE-2019-19244",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19244 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19244 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19244"
},
{
"cve": "CVE-2019-19317",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "summary",
"text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19317 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19317 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19317"
},
{
"cve": "CVE-2019-19603",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19603 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19603 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19603"
},
{
"cve": "CVE-2019-19645",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19645 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19645 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19645"
},
{
"cve": "CVE-2019-19646",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19646 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19646 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19646"
},
{
"cve": "CVE-2019-19880",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19880 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19880 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19923 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19923 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19924",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19924 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19924 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19924"
},
{
"cve": "CVE-2019-19925",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "summary",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19925 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19925 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-19926 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2019-19926 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-1971 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-1971 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-7774",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"notes": [
{
"category": "summary",
"text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-7774 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-7774 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8169",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8169 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8169 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8177 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8177 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8231 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8231 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8265 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8265 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8265"
},
{
"cve": "CVE-2020-8284",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8284 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8284 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8285 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8285 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8286 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8286 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8287",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8287 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8287 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8287"
},
{
"cve": "CVE-2020-8625",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-8625 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-8625 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-9327",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-9327 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-9327 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-9327"
},
{
"cve": "CVE-2020-11655",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"notes": [
{
"category": "summary",
"text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-11655 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-11655 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-11655"
},
{
"cve": "CVE-2020-11656",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-11656 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-11656 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-11656"
},
{
"cve": "CVE-2020-13630",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-13630 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13630 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-13630"
},
{
"cve": "CVE-2020-13631",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-13631 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13631 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-13631"
},
{
"cve": "CVE-2020-13632",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-13632 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13632 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-13632"
},
{
"cve": "CVE-2020-13871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-13871 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-13871 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-13871"
},
{
"cve": "CVE-2020-15358",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-15358 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-15358 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-27304",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2020-27304 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2020-27304 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-27304"
},
{
"cve": "CVE-2021-3449",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-3449 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3449 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-3450 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3450 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3672",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-3672 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3672 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3672"
},
{
"cve": "CVE-2021-3711",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-3711 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3711 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-3712 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-3712 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-22876",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22876 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22876 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22883",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22883 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22883 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22883"
},
{
"cve": "CVE-2021-22884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22884 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22884 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22884"
},
{
"cve": "CVE-2021-22890",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "summary",
"text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22890 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22890 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22897 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22897 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "summary",
"text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22898 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22898 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22901 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22901 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22918",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22918 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22918 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-22921",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22921 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22921 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22921"
},
{
"cve": "CVE-2021-22922",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22922 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22922 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "summary",
"text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22923 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22923 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"notes": [
{
"category": "summary",
"text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22924 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22924 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22925 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22925 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22926 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22926 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22930",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22930 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22930 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22930"
},
{
"cve": "CVE-2021-22931",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22931 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22931 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22931"
},
{
"cve": "CVE-2021-22939",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22939 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22939 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22939"
},
{
"cve": "CVE-2021-22940",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22940 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22940 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22940"
},
{
"cve": "CVE-2021-22945",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22945 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22945 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22946 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22946 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-22947 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-22947 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23362",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-23362 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-23362 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-23840",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-23840 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-23840 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-25214",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25214 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25214 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25215",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25215 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25215 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25215"
},
{
"cve": "CVE-2021-25216",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25216 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25216 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25216"
},
{
"cve": "CVE-2021-25219",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25219 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-25219 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25219"
},
{
"cve": "CVE-2021-27290",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-27290 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-27290 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-32803",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-32803 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-32803 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-32804 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-32804 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-37701",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-37701 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37701 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-37712 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37712 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-37713 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-37713 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-39134",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "summary",
"text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-39134 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-39134 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39134"
},
{
"cve": "CVE-2021-39135",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "summary",
"text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-39135 - SINEC INS",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
},
{
"summary": "CVE-2021-39135 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.0.1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-39135"
}
]
}
OPENSUSE-SU-2021:2353-1
Vulnerability from csaf_opensuse - Published: 2021-07-15 13:18 - Updated: 2021-07-15 13:18Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs10",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs10 fixes the following issues:\n\nUpdate nodejs10 to 10.24.1.\n\nIncluding fixes for \n\n- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)\n- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)\n- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n- reduce memory footprint of test-worker-stdio (bsc#1183155)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2353",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2353-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2353-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2353-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/"
},
{
"category": "self",
"summary": "SUSE Bug 1183155",
"url": "https://bugzilla.suse.com/1183155"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs10",
"tracking": {
"current_release_date": "2021-07-15T13:18:04Z",
"generator": {
"date": "2021-07-15T13:18:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2353-1",
"initial_release_date": "2021-07-15T13:18:04Z",
"revision_history": [
{
"date": "2021-07-15T13:18:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.aarch64",
"product": {
"name": "nodejs10-10.24.1-1.36.1.aarch64",
"product_id": "nodejs10-10.24.1-1.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"product_id": "nodejs10-devel-10.24.1-1.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.aarch64",
"product": {
"name": "npm10-10.24.1-1.36.1.aarch64",
"product_id": "npm10-10.24.1-1.36.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-docs-10.24.1-1.36.1.noarch",
"product": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch",
"product_id": "nodejs10-docs-10.24.1-1.36.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.ppc64le",
"product": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le",
"product_id": "nodejs10-10.24.1-1.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"product_id": "nodejs10-devel-10.24.1-1.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.ppc64le",
"product": {
"name": "npm10-10.24.1-1.36.1.ppc64le",
"product_id": "npm10-10.24.1-1.36.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.s390x",
"product": {
"name": "nodejs10-10.24.1-1.36.1.s390x",
"product_id": "nodejs10-10.24.1-1.36.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.s390x",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x",
"product_id": "nodejs10-devel-10.24.1-1.36.1.s390x"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.s390x",
"product": {
"name": "npm10-10.24.1-1.36.1.s390x",
"product_id": "npm10-10.24.1-1.36.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-1.36.1.x86_64",
"product": {
"name": "nodejs10-10.24.1-1.36.1.x86_64",
"product_id": "nodejs10-10.24.1-1.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"product": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"product_id": "nodejs10-devel-10.24.1-1.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-1.36.1.x86_64",
"product": {
"name": "npm10-10.24.1-1.36.1.x86_64",
"product_id": "npm10-10.24.1-1.36.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-1.36.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-1.36.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-1.36.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-1.36.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64"
},
"product_reference": "npm10-10.24.1-1.36.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le"
},
"product_reference": "npm10-10.24.1-1.36.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x"
},
"product_reference": "npm10-10.24.1-1.36.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-1.36.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
},
"product_reference": "npm10-10.24.1-1.36.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:nodejs10-devel-10.24.1-1.36.1.x86_64",
"openSUSE Leap 15.3:nodejs10-docs-10.24.1-1.36.1.noarch",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.aarch64",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.ppc64le",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.s390x",
"openSUSE Leap 15.3:npm10-10.24.1-1.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-15T13:18:04Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
OPENSUSE-SU-2021:1061-1
Vulnerability from csaf_opensuse - Published: 2021-07-19 21:03 - Updated: 2021-07-19 21:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs10",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs10 fixes the following issues:\n\nUpdate nodejs10 to 10.24.1.\n\nIncluding fixes for \n\n- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)\n- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)\n- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)\n- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)\n- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)\n- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)\n- reduce memory footprint of test-worker-stdio (bsc#1183155)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1061",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1061-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1061-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1061-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/"
},
{
"category": "self",
"summary": "SUSE Bug 1183155",
"url": "https://bugzilla.suse.com/1183155"
},
{
"category": "self",
"summary": "SUSE Bug 1183851",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "self",
"summary": "SUSE Bug 1183852",
"url": "https://bugzilla.suse.com/1183852"
},
{
"category": "self",
"summary": "SUSE Bug 1184450",
"url": "https://bugzilla.suse.com/1184450"
},
{
"category": "self",
"summary": "SUSE Bug 1187973",
"url": "https://bugzilla.suse.com/1187973"
},
{
"category": "self",
"summary": "SUSE Bug 1187976",
"url": "https://bugzilla.suse.com/1187976"
},
{
"category": "self",
"summary": "SUSE Bug 1187977",
"url": "https://bugzilla.suse.com/1187977"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7774 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27290 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
}
],
"title": "Security update for nodejs10",
"tracking": {
"current_release_date": "2021-07-19T21:03:56Z",
"generator": {
"date": "2021-07-19T21:03:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1061-1",
"initial_release_date": "2021-07-19T21:03:56Z",
"revision_history": [
{
"date": "2021-07-19T21:03:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-lp152.2.15.1.i586",
"product": {
"name": "nodejs10-10.24.1-lp152.2.15.1.i586",
"product_id": "nodejs10-10.24.1-lp152.2.15.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"product": {
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"product_id": "nodejs10-devel-10.24.1-lp152.2.15.1.i586"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-lp152.2.15.1.i586",
"product": {
"name": "npm10-10.24.1-lp152.2.15.1.i586",
"product_id": "npm10-10.24.1-lp152.2.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"product": {
"name": "nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"product_id": "nodejs10-docs-10.24.1-lp152.2.15.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs10-10.24.1-lp152.2.15.1.x86_64",
"product": {
"name": "nodejs10-10.24.1-lp152.2.15.1.x86_64",
"product_id": "nodejs10-10.24.1-lp152.2.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"product": {
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"product_id": "nodejs10-devel-10.24.1-lp152.2.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm10-10.24.1-lp152.2.15.1.x86_64",
"product": {
"name": "npm10-10.24.1-lp152.2.15.1.x86_64",
"product_id": "npm10-10.24.1-lp152.2.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-lp152.2.15.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586"
},
"product_reference": "nodejs10-10.24.1-lp152.2.15.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-10.24.1-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64"
},
"product_reference": "nodejs10-10.24.1-lp152.2.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586"
},
"product_reference": "nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-devel-10.24.1-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64"
},
"product_reference": "nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs10-docs-10.24.1-lp152.2.15.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch"
},
"product_reference": "nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-lp152.2.15.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586"
},
"product_reference": "npm10-10.24.1-lp152.2.15.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm10-10.24.1-lp152.2.15.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
},
"product_reference": "npm10-10.24.1-lp152.2.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7774"
}
],
"notes": [
{
"category": "general",
"text": "The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7774",
"url": "https://www.suse.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "SUSE Bug 1184450 for CVE-2020-7774",
"url": "https://bugzilla.suse.com/1184450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "important"
}
],
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2021-22918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22918"
}
],
"notes": [
{
"category": "general",
"text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22918",
"url": "https://www.suse.com/security/cve/CVE-2021-22918"
},
{
"category": "external",
"summary": "SUSE Bug 1187973 for CVE-2021-22918",
"url": "https://bugzilla.suse.com/1187973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2021-22918"
},
{
"cve": "CVE-2021-23362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23362"
}
],
"notes": [
{
"category": "general",
"text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23362",
"url": "https://www.suse.com/security/cve/CVE-2021-23362"
},
{
"category": "external",
"summary": "SUSE Bug 1187977 for CVE-2021-23362",
"url": "https://bugzilla.suse.com/1187977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "moderate"
}
],
"title": "CVE-2021-23362"
},
{
"cve": "CVE-2021-27290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27290"
}
],
"notes": [
{
"category": "general",
"text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27290",
"url": "https://www.suse.com/security/cve/CVE-2021-27290"
},
{
"category": "external",
"summary": "SUSE Bug 1187976 for CVE-2021-27290",
"url": "https://bugzilla.suse.com/1187976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "important"
}
],
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-3449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3449"
}
],
"notes": [
{
"category": "general",
"text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3449",
"url": "https://www.suse.com/security/cve/CVE-2021-3449"
},
{
"category": "external",
"summary": "SUSE Bug 1183852 for CVE-2021-3449",
"url": "https://bugzilla.suse.com/1183852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "important"
}
],
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3450"
}
],
"notes": [
{
"category": "general",
"text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3450",
"url": "https://www.suse.com/security/cve/CVE-2021-3450"
},
{
"category": "external",
"summary": "SUSE Bug 1183851 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1183851"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1225628 for CVE-2021-3450",
"url": "https://bugzilla.suse.com/1225628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:nodejs10-devel-10.24.1-lp152.2.15.1.x86_64",
"openSUSE Leap 15.2:nodejs10-docs-10.24.1-lp152.2.15.1.noarch",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.i586",
"openSUSE Leap 15.2:npm10-10.24.1-lp152.2.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:56Z",
"details": "important"
}
],
"title": "CVE-2021-3450"
}
]
}
OPENSUSE-SU-2024:11127-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libopenssl-1_1-devel-1.1.1l-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libopenssl-1_1-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11127",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11127-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-2937 page",
"url": "https://www.suse.com/security/cve/CVE-2006-2937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2006-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-3738 page",
"url": "https://www.suse.com/security/cve/CVE-2006-3738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-4339 page",
"url": "https://www.suse.com/security/cve/CVE-2006-4339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-4343 page",
"url": "https://www.suse.com/security/cve/CVE-2006-4343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-7250 page",
"url": "https://www.suse.com/security/cve/CVE-2006-7250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-3108 page",
"url": "https://www.suse.com/security/cve/CVE-2007-3108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-5135 page",
"url": "https://www.suse.com/security/cve/CVE-2007-5135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-0891 page",
"url": "https://www.suse.com/security/cve/CVE-2008-0891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1672 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-5077 page",
"url": "https://www.suse.com/security/cve/CVE-2008-5077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0590 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0591 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0789 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1377 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1378 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1379 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1386 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1387 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-0740 page",
"url": "https://www.suse.com/security/cve/CVE-2010-0740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-0742 page",
"url": "https://www.suse.com/security/cve/CVE-2010-0742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1633 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2939 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3864 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-5298 page",
"url": "https://www.suse.com/security/cve/CVE-2010-5298/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0014 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3207 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4108 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4576 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4577 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4619 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0027 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0050 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0884 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1165 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-2110 page",
"url": "https://www.suse.com/security/cve/CVE-2012-2110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-2686 page",
"url": "https://www.suse.com/security/cve/CVE-2012-2686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-4929 page",
"url": "https://www.suse.com/security/cve/CVE-2012-4929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0166 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0169 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4353 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6449 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6450 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0076 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0160 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0195 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0198 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0221 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0224 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3470 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3470/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3505 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3506 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3507 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3508 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3508/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3509 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3510 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3510/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3511 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3512 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3513 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3568 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3569 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3570 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3571 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3572 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5139 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8275 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0204 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0205 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0206 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0209 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0286 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0287 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0288 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0289 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0293 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1788 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1789 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1790 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1791 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1792 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1793 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1794 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3193 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3194 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3195 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3196 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3197 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0701 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0701/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0702 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0705 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0797 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0798 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0800 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2109 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2176 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2179 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2180 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2181 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6302 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7052 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7055 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7056 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3735 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3736 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3738 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0732 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0734 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0735 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0737 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0739 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1543 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1547 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1549 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1551 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1563 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1967 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1971 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23840 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23841 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3449 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3450 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3712 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3712/"
}
],
"title": "libopenssl-1_1-devel-1.1.1l-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11127-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-1.2.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1l-1.2.aarch64",
"product_id": "libopenssl1_1-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"product_id": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-1.2.aarch64",
"product": {
"name": "openssl-1_1-1.1.1l-1.2.aarch64",
"product_id": "openssl-1_1-1.1.1l-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-1.2.aarch64",
"product": {
"name": "openssl-1_1-doc-1.1.1l-1.2.aarch64",
"product_id": "openssl-1_1-doc-1.1.1l-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-1.2.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1l-1.2.ppc64le",
"product_id": "libopenssl1_1-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"product_id": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-1.2.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1l-1.2.ppc64le",
"product_id": "openssl-1_1-1.1.1l-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"product": {
"name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"product_id": "openssl-1_1-doc-1.1.1l-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-1.2.s390x",
"product": {
"name": "libopenssl1_1-1.1.1l-1.2.s390x",
"product_id": "libopenssl1_1-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"product_id": "libopenssl1_1-32bit-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-1.2.s390x",
"product": {
"name": "openssl-1_1-1.1.1l-1.2.s390x",
"product_id": "openssl-1_1-1.1.1l-1.2.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-1.2.s390x",
"product": {
"name": "openssl-1_1-doc-1.1.1l-1.2.s390x",
"product_id": "openssl-1_1-doc-1.1.1l-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-1.2.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1l-1.2.x86_64",
"product_id": "libopenssl1_1-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-1.2.x86_64",
"product": {
"name": "openssl-1_1-1.1.1l-1.2.x86_64",
"product_id": "openssl-1_1-1.1.1l-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-1.2.x86_64",
"product": {
"name": "openssl-1_1-doc-1.1.1l-1.2.x86_64",
"product_id": "openssl-1_1-doc-1.1.1l-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64"
},
"product_reference": "openssl-1_1-doc-1.1.1l-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le"
},
"product_reference": "openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x"
},
"product_reference": "openssl-1_1-doc-1.1.1l-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
},
"product_reference": "openssl-1_1-doc-1.1.1l-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-2937"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-2937",
"url": "https://www.suse.com/security/cve/CVE-2006-2937"
},
{
"category": "external",
"summary": "SUSE Bug 202366 for CVE-2006-2937",
"url": "https://bugzilla.suse.com/202366"
},
{
"category": "external",
"summary": "SUSE Bug 207635 for CVE-2006-2937",
"url": "https://bugzilla.suse.com/207635"
},
{
"category": "external",
"summary": "SUSE Bug 215623 for CVE-2006-2937",
"url": "https://bugzilla.suse.com/215623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-2937"
},
{
"cve": "CVE-2006-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-2940"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-2940",
"url": "https://www.suse.com/security/cve/CVE-2006-2940"
},
{
"category": "external",
"summary": "SUSE Bug 202366 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/202366"
},
{
"category": "external",
"summary": "SUSE Bug 207635 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/207635"
},
{
"category": "external",
"summary": "SUSE Bug 208971 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/208971"
},
{
"category": "external",
"summary": "SUSE Bug 215623 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/215623"
},
{
"category": "external",
"summary": "SUSE Bug 223040 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/223040"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2006-2940",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-2940"
},
{
"cve": "CVE-2006-3738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-3738"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-3738",
"url": "https://www.suse.com/security/cve/CVE-2006-3738"
},
{
"category": "external",
"summary": "SUSE Bug 202366 for CVE-2006-3738",
"url": "https://bugzilla.suse.com/202366"
},
{
"category": "external",
"summary": "SUSE Bug 215623 for CVE-2006-3738",
"url": "https://bugzilla.suse.com/215623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2006-3738"
},
{
"cve": "CVE-2006-4339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-4339"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-4339",
"url": "https://www.suse.com/security/cve/CVE-2006-4339"
},
{
"category": "external",
"summary": "SUSE Bug 202366 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/202366"
},
{
"category": "external",
"summary": "SUSE Bug 203595 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/203595"
},
{
"category": "external",
"summary": "SUSE Bug 206636 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/206636"
},
{
"category": "external",
"summary": "SUSE Bug 207635 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/207635"
},
{
"category": "external",
"summary": "SUSE Bug 215623 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/215623"
},
{
"category": "external",
"summary": "SUSE Bug 218303 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/218303"
},
{
"category": "external",
"summary": "SUSE Bug 233584 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/233584"
},
{
"category": "external",
"summary": "SUSE Bug 564512 for CVE-2006-4339",
"url": "https://bugzilla.suse.com/564512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-4339"
},
{
"cve": "CVE-2006-4343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-4343"
}
],
"notes": [
{
"category": "general",
"text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-4343",
"url": "https://www.suse.com/security/cve/CVE-2006-4343"
},
{
"category": "external",
"summary": "SUSE Bug 202366 for CVE-2006-4343",
"url": "https://bugzilla.suse.com/202366"
},
{
"category": "external",
"summary": "SUSE Bug 207635 for CVE-2006-4343",
"url": "https://bugzilla.suse.com/207635"
},
{
"category": "external",
"summary": "SUSE Bug 215623 for CVE-2006-4343",
"url": "https://bugzilla.suse.com/215623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-4343"
},
{
"cve": "CVE-2006-7250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-7250"
}
],
"notes": [
{
"category": "general",
"text": "The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x",
"openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64"
]
},
"references": [
{