Vulnerabilites related to Weidmueller - IE-SW-VL08MT-5TX-1SC-2SCS
var-201912-1227
Vulnerability from variot

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M Contains a vulnerability related to the lack of encryption of critical data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany's Weidmueller company.

An information disclosure vulnerability exists in several Weidmueller products. An attacker could use this vulnerability to obtain credential data

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1227",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ie-sw-vl05m-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-pl08m-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16m-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16mt-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl16m-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl08m-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-vl05m-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09m 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09mt 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 3sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 1sc 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2scs",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      }
    ]
  },
  "cve": "CVE-2019-16672",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-16672",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-01004",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16672",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16672",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-16672",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2019-16672",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-16672",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-01004",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-219",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M Contains a vulnerability related to the lack of encryption of critical data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany\u0027s Weidmueller company. \n\nAn information disclosure vulnerability exists in several Weidmueller products. An attacker could use this vulnerability to obtain credential data",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-16672",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-339-02",
        "trust": 3.0
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2019-018",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4566",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "9084EBCC-BD6A-4A7C-B4F1-05CBAAB9D4FD",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "id": "VAR-201912-1227",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      }
    ],
    "trust": 1.511309525
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:36:22.176000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D1400074",
        "trust": 0.8,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "title": "Patch for Multiple Weidmueller Product Information Disclosure Vulnerabilities (CNVD-2020-01004)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/196389"
      },
      {
        "title": "Multiple Weidmueller Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104159"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-319",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-522",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-311",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
      },
      {
        "trust": 1.6,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "trust": 1.6,
        "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16672"
      },
      {
        "trust": 1.0,
        "url": "https://cert.vde.com/en-us/advisories"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16672"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4566/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "date": "2019-12-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "date": "2019-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "date": "2019-12-06T18:15:12.217000",
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01004"
      },
      {
        "date": "2019-12-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      },
      {
        "date": "2022-04-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      },
      {
        "date": "2024-11-21T04:30:56.840000",
        "db": "NVD",
        "id": "CVE-2019-16672"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Weidmueller Lack of encryption of sensitive data in product vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012672"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "9084ebcc-bd6a-4a7c-b4f1-05cbaab9d4fd"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-219"
      }
    ],
    "trust": 0.8
  }
}

var-201912-1228
Vulnerability from variot

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a vulnerability related to information disclosure from the cache.Information may be obtained. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany's Weidmueller company.

An insecure credential storage vulnerability exists in several Weidmueller products. The vulnerability stems from programs storing passwords in plain text, which can be used by attackers to read passwords

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1228",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ie-sw-vl05m-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-pl08m-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16m-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16mt-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl16m-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl08m-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-vl05m-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09m 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09mt 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 3sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 1sc 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2scs",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      }
    ]
  },
  "cve": "CVE-2019-16673",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2019-16673",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2020-01003",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "224f0523-8217-4d15-9fc5-d5b702dd414b",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-16673",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16673",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-16673",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-16673",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2019-16673",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-16673",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-01003",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-220",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "224f0523-8217-4d15-9fc5-d5b702dd414b",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-16673",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a vulnerability related to information disclosure from the cache.Information may be obtained. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany\u0027s Weidmueller company. \n\nAn insecure credential storage vulnerability exists in several Weidmueller products. The vulnerability stems from programs storing passwords in plain text, which can be used by attackers to read passwords",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-16673",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-339-02",
        "trust": 3.1
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2019-018",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4566",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "224F0523-8217-4D15-9FC5-D5B702DD414B",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "id": "VAR-201912-1228",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      }
    ],
    "trust": 1.5113095250000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:36:22.104000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D1400074",
        "trust": 0.8,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "title": "Patch for Multiple Weidmueller Products Insecure Credential Storage Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/196387"
      },
      {
        "title": "Multiple Weidmueller Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104771"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-522",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
      },
      {
        "trust": 1.7,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16673"
      },
      {
        "trust": 1.1,
        "url": "https://cert.vde.com/en-us/advisories"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16673"
      },
      {
        "trust": 0.8,
        "url": "https://github.com/klezvirus/cves/tree/master/nopcommerce/cross-site-scripting"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4566/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/522.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "date": "2019-12-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "date": "2019-12-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "date": "2019-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "date": "2019-12-06T18:15:12.310000",
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01003"
      },
      {
        "date": "2019-12-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-16673"
      },
      {
        "date": "2019-12-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      },
      {
        "date": "2019-12-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      },
      {
        "date": "2024-11-21T04:30:57.030000",
        "db": "NVD",
        "id": "CVE-2019-16673"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Weidmueller Vulnerability related to information leakage from cache in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012718"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "224f0523-8217-4d15-9fc5-d5b702dd414b"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-220"
      }
    ],
    "trust": 0.8
  }
}

var-201912-1225
Vulnerability from variot

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device is vulnerable to improper restriction of excessive authentication attempts.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany's Weidmueller company.

There are security vulnerabilities in several Weidmueller products. The vulnerability stems from the failure of the authentication mechanism to protect against brute force attacks. Attackers can use this vulnerability to implement brute force attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1225",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ie-sw-vl05m-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-pl08m-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16m-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16mt-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl16m-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl08m-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-vl05m-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09m 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09mt 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 3sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 1sc 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2scs",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      }
    ]
  },
  "cve": "CVE-2019-16670",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-16670",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-01005",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16670",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16670",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-16670",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2019-16670",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-16670",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-01005",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-217",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-16670",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device is vulnerable to improper restriction of excessive authentication attempts.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany\u0027s Weidmueller company. \n\nThere are security vulnerabilities in several Weidmueller products. The vulnerability stems from the failure of the authentication mechanism to protect against brute force attacks. Attackers can use this vulnerability to implement brute force attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-16670",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-339-02",
        "trust": 3.1
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2019-018",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4566",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "30B3ABEC-C13B-49F9-9CB4-019C7F7A19C9",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "id": "VAR-201912-1225",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      }
    ],
    "trust": 1.511309525
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:36:22.211000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D1400074",
        "trust": 0.8,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "title": "Patch for Multiple Weidmuellers have unknown vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/196381"
      },
      {
        "title": "Multiple Weidmueller Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104160"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-307",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
      },
      {
        "trust": 1.7,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "trust": 1.7,
        "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16670"
      },
      {
        "trust": 1.1,
        "url": "https://cert.vde.com/en-us/advisories"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16670"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4566/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/307.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "date": "2019-12-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "date": "2019-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "date": "2019-12-06T18:15:11.887000",
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01005"
      },
      {
        "date": "2019-12-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-16670"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      },
      {
        "date": "2019-12-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      },
      {
        "date": "2024-11-21T04:30:56.453000",
        "db": "NVD",
        "id": "CVE-2019-16670"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Weidmueller Product vulnerable to inappropriate restriction of excessive authentication attempts",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012857"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "30b3abec-c13b-49f9-9cb4-019c7f7a19c9"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-217"
      }
    ],
    "trust": 0.8
  }
}

var-201912-1224
Vulnerability from variot

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a vulnerability in transmitting sensitive information in the clear.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany's Weidmueller company.

An information disclosure vulnerability exists in several Weidmueller products. Attackers can use this vulnerability to guess the authentication information in cookies

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1224",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ie-sw-vl05m-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-pl08m-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16m-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16mt-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl16m-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl08m-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-vl05m-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09m 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09mt 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 3sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 1sc 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2scs",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      }
    ]
  },
  "cve": "CVE-2019-16674",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-16674",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-01002",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16674",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-16674",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-16674",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2019-16674",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-16674",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-01002",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-227",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a vulnerability in transmitting sensitive information in the clear.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany\u0027s Weidmueller company. \n\nAn information disclosure vulnerability exists in several Weidmueller products. Attackers can use this vulnerability to guess the authentication information in cookies",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-16674",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-339-02",
        "trust": 3.0
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2019-018",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4566",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "8EBFD49B-465D-44F6-8910-5F4D4D49C8AF",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "id": "VAR-201912-1224",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      }
    ],
    "trust": 1.511309525
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:36:22.141000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D1400074",
        "trust": 0.8,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "title": "Patch for Multiple Weidmueller Product Information Disclosure Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/196385"
      },
      {
        "title": "Multiple Weidmueller Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104153"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-319",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
      },
      {
        "trust": 1.6,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "trust": 1.6,
        "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16674"
      },
      {
        "trust": 1.0,
        "url": "https://cert.vde.com/en-us/advisories"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16674"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4566/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "date": "2019-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "date": "2019-12-06T18:15:12.403000",
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01002"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      },
      {
        "date": "2019-12-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      },
      {
        "date": "2024-11-21T04:30:57.230000",
        "db": "NVD",
        "id": "CVE-2019-16674"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Weidmueller Vulnerability related to clear transmission of important information in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012859"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "8ebfd49b-465d-44f6-8910-5f4d4d49c8af"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-227"
      }
    ],
    "trust": 0.8
  }
}

var-201912-1226
Vulnerability from variot

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany's Weidmueller company

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1226",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ie-sw-vl05m-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-5tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-pl08m-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl16m-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.4"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.6.6"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-vl08mt-8tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.5.2"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.16"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.4"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.3.8"
      },
      {
        "model": "ie-sw-pl16mt-16tx",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "weidmueller",
        "version": "3.4.2"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st",
        "scope": null,
        "trust": 0.8,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl09m-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl09mt-5gc-4gt build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.416102416"
      },
      {
        "model": "ie-sw-pl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.1616102416"
      },
      {
        "model": "ie-sw-pl16m-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16m-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl16mt-14tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.216102416"
      },
      {
        "model": "ie-sw-pl18m-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc-16tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18mt-2gc14tx2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl18m-2gc14tx2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.4.416102416"
      },
      {
        "model": "ie-sw-pl08m-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.3.816102416"
      },
      {
        "model": "ie-sw-vl05m-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-5tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05m-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl05mt-3tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.6.616102415"
      },
      {
        "model": "ie-sw-vl08mt-8tx build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-3sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-5tx-1sc-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2st build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2sc build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-vl08mt-6tx-2scs build",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": "\u003c=3.5.216102415"
      },
      {
        "model": "ie-sw-pl08mt-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2sc",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-3gt-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10mt-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08mt-6tx-2scs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl08m-6tx-2st",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": "ie-sw-pl10m-1gt-2gs-7tx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "weidmueller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09m 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16m 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl16mt 14tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 5tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl09mt 5gc 4gt",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05m 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl05mt 3tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 3sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 5tx 1sc 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw vl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 8tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08m 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl08mt 6tx 2scs",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 3gt 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10m 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc 16tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl10mt 1gt 2gs 7tx",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2sc",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18mt 2gc14tx2st",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ie sw pl18m 2gc14tx2scs",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      }
    ]
  },
  "cve": "CVE-2019-16671",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2019-16671",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2020-01006",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "2adc5305-11c9-4580-8a02-bf083e94ec21",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-16671",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-16671",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-16671",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2019-16671",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-16671",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-01006",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201912-218",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "2adc5305-11c9-4580-8a02-bf083e94ec21",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption. Weidmueller IE-SW-VL05M , IE-SW-VL08MT , IE-SW-PL10M The device contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Weidmueller IE-SW-VL05M-5TX is an industrial Ethernet switch from Germany\u0027s Weidmueller company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-16671",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-339-02",
        "trust": 3.0
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2019-018",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4566",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "2ADC5305-11C9-4580-8A02-BF083E94EC21",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "id": "VAR-201912-1226",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      }
    ],
    "trust": 1.5113095250000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:36:22.248000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D1400074",
        "trust": 0.8,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "title": "Patch for Multiple Weidmueller Product Resource Management Error Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/196383"
      },
      {
        "title": "Multiple Weidmueller Product resource management error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104158"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
      },
      {
        "trust": 1.6,
        "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
      },
      {
        "trust": 1.6,
        "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16671"
      },
      {
        "trust": 1.0,
        "url": "https://cert.vde.com/en-us/advisories"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16671"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4566/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "date": "2019-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "date": "2019-12-06T18:15:12.107000",
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-01006"
      },
      {
        "date": "2019-12-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      },
      {
        "date": "2019-12-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      },
      {
        "date": "2024-11-21T04:30:56.653000",
        "db": "NVD",
        "id": "CVE-2019-16671"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Weidmueller Product depletion vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012858"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "2adc5305-11c9-4580-8a02-bf083e94ec21"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201912-218"
      }
    ],
    "trust": 0.8
  }
}

CVE-2019-16672 (GCVE-0-2019-16672)
Vulnerability from cvelistv5
Published
2019-12-06 17:07
Modified
2024-08-05 01:17
Severity ?
CWE
  • n/a
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T03:01:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16672",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "CONFIRM",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16672",
    "datePublished": "2019-12-06T17:07:21",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41652 (GCVE-0-2025-41652)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-08-22 10:36
Severity ?
CWE
Summary
The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41652",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:14:16.971895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:17:16.639Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
            }
          ],
          "value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-328",
              "description": "CWE-328 Use of Weak Hash",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-22T10:36:13.148Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41652",
    "datePublished": "2025-05-27T08:38:12.340Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-08-22T10:36:13.148Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-16670 (GCVE-0-2019-16670)
Vulnerability from cvelistv5
Published
2019-12-06 17:05
Modified
2024-08-05 01:17
Severity ?
CWE
  • n/a
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T02:59:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16670",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "MISC",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16670",
    "datePublished": "2019-12-06T17:05:02",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-16674 (GCVE-0-2019-16674)
Vulnerability from cvelistv5
Published
2019-12-06 17:09
Modified
2024-08-05 01:17
Severity ?
CWE
  • n/a
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.079Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T03:02:57",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16674",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "CONFIRM",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16674",
    "datePublished": "2019-12-06T17:09:17",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.079Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-16671 (GCVE-0-2019-16671)
Vulnerability from cvelistv5
Published
2019-12-06 17:06
Modified
2024-08-05 01:17
CWE
  • n/a
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.066Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T03:00:36",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16671",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "CONFIRM",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16671",
    "datePublished": "2019-12-06T17:06:23",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.066Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-16673 (GCVE-0-2019-16673)
Vulnerability from cvelistv5
Published
2019-12-06 17:08
Modified
2024-08-05 01:17
CWE
  • n/a
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.032Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T03:02:23",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16673",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "CONFIRM",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16673",
    "datePublished": "2019-12-06T17:08:23",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41653 (GCVE-0-2025-41653)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-05-27 13:12
CWE
  • CWE-410 - Insufficient Resource Pool
Summary
An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41653",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:08:48.596317Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:12:39.961Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-410",
              "description": "CWE-410 Insufficient Resource Pool",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:38:29.005Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Denial-of-Service Vulnerability in the web server functionality of Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41653",
    "datePublished": "2025-05-27T08:38:29.005Z",
    "dateReserved": "2025-04-16T11:17:48.306Z",
    "dateUpdated": "2025-05-27T13:12:39.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41650 (GCVE-0-2025-41650)
Vulnerability from cvelistv5
Published
2025-05-27 08:37
Modified
2025-05-27 13:39
CWE
  • CWE-1287 - Improper Validation of Specified Type of Input
Summary
An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:37:42.461446Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:39:51.332Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1287",
              "description": "CWE-1287 Improper Validation of Specified Type of Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:37:44.635Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Denial-of-Service Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41650",
    "datePublished": "2025-05-27T08:37:44.635Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:39:51.332Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41651 (GCVE-0-2025-41651)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-05-27 13:26
Severity ?
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41651",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:24:17.307653Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:26:59.857Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
            }
          ],
          "value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:38:03.213Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Missing Authentication Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41651",
    "datePublished": "2025-05-27T08:38:03.213Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:26:59.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41649 (GCVE-0-2025-41649)
Vulnerability from cvelistv5
Published
2025-05-27 08:37
Modified
2025-05-27 13:57
CWE
Summary
An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41649",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:50:43.784206Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:57:42.958Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:37:26.201Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Out-of-Bounds Write Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41649",
    "datePublished": "2025-05-27T08:37:26.201Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:57:42.958Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-12-06 18:15
Modified
2024-11-21 04:30
Severity ?
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network.
Impacted products
Vendor Product Version
weidmueller ie-sw-pl09m-5gc-4gt_firmware *
weidmueller ie-sw-pl09m-5gc-4gt -
weidmueller ie-sw-pl09mt-5gc-4gt_firmware *
weidmueller ie-sw-pl09mt-5gc-4gt -
weidmueller ie-sw-pl18m-2gc-16tx_firmware *
weidmueller ie-sw-pl18m-2gc-16tx -
weidmueller ie-sw-pl18mt-2gc-16tx_firmware *
weidmueller ie-sw-pl18mt-2gc-16tx -
weidmueller ie-sw-pl18m-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18m-2gc14tx2sc -
weidmueller ie-sw-pl18mt-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2sc -
weidmueller ie-sw-pl18m-2gc14tx2st_firmware *
weidmueller ie-sw-pl18m-2gc14tx2st -
weidmueller ie-sw-pl18mt-2gc14tx2st_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2st -
weidmueller ie-sw-pl18m-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18m-2gc14tx2scs -
weidmueller ie-sw-pl18mt-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2scs -
weidmueller ie-sw-pl16m-16tx_firmware *
weidmueller ie-sw-pl16m-16tx -
weidmueller ie-sw-pl16mt-16tx_firmware *
weidmueller ie-sw-pl16mt-16tx -
weidmueller ie-sw-pl16m-14tx-2sc_firmware *
weidmueller ie-sw-pl16m-14tx-2sc -
weidmueller ie-sw-pl16mt-14tx-2sc_firmware *
weidmueller ie-sw-pl16mt-14tx-2sc -
weidmueller ie-sw-pl16m-14tx-2st_firmware *
weidmueller ie-sw-pl16m-14tx-2st -
weidmueller ie-sw-pl16mt-14tx-2st_firmware *
weidmueller ie-sw-pl16mt-14tx-2st -
weidmueller ie-sw-vl05m-5tx_firmware *
weidmueller ie-sw-vl05m-5tx -
weidmueller ie-sw-vl05mt-5tx_firmware *
weidmueller ie-sw-vl05mt-5tx -
weidmueller ie-sw-vl05m-3tx-2sc_firmware *
weidmueller ie-sw-vl05m-3tx-2sc -
weidmueller ie-sw-vl05mt-3tx-2sc_firmware *
weidmueller ie-sw-vl05mt-3tx-2sc -
weidmueller ie-sw-vl05m-3tx-2st_firmware *
weidmueller ie-sw-vl05m-3tx-2st -
weidmueller ie-sw-vl05mt-3tx-2st_firmware *
weidmueller ie-sw-vl05mt-3tx-2st -
weidmueller ie-sw-vl08mt-8tx_firmware *
weidmueller ie-sw-vl08mt-8tx -
weidmueller ie-sw-vl08mt-5tx-3sc_firmware *
weidmueller ie-sw-vl08mt-5tx-3sc -
weidmueller ie-sw-vl08mt-5tx-1sc-2scs_firmware *
weidmueller ie-sw-vl08mt-5tx-1sc-2scs -
weidmueller ie-sw-vl08mt-6tx-2st_firmware *
weidmueller ie-sw-vl08mt-6tx-2st -
weidmueller ie-sw-vl08mt-6tx-2sc_firmware *
weidmueller ie-sw-vl08mt-6tx-2sc -
weidmueller ie-sw-vl08mt-6tx-2scs_firmware *
weidmueller ie-sw-vl08mt-6tx-2scs -
weidmueller ie-sw-pl08m-8tx_firmware *
weidmueller ie-sw-pl08m-8tx -
weidmueller ie-sw-pl08mt-8tx_firmware *
weidmueller ie-sw-pl08mt-8tx -
weidmueller ie-sw-pl08m-6tx-2sc_firmware *
weidmueller ie-sw-pl08m-6tx-2sc -
weidmueller ie-sw-pl08mt-6tx-2sc_firmware *
weidmueller ie-sw-pl08mt-6tx-2sc -
weidmueller ie-sw-pl08m-6tx-2st_firmware *
weidmueller ie-sw-pl08m-6tx-2st -
weidmueller ie-sw-pl08mt-6tx-2st_firmware *
weidmueller ie-sw-pl08mt-6tx-2st -
weidmueller ie-sw-pl08m-6tx-2scs_firmware *
weidmueller ie-sw-pl08m-6tx-2scs -
weidmueller ie-sw-pl08mt-6tx-2scs_firmware *
weidmueller ie-sw-pl08mt-6tx-2scs -
weidmueller ie-sw-pl10m-3gt-7tx_firmware *
weidmueller ie-sw-pl10m-3gt-7tx -
weidmueller ie-sw-pl10mt-3gt-7tx_firmware *
weidmueller ie-sw-pl10mt-3gt-7tx -
weidmueller ie-sw-pl10m-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10m-1gt-2gs-7tx -
weidmueller ie-sw-pl10mt-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10mt-1gt-2gs-7tx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31600141-CFA5-4B40-9F47-993CB2F8EAFC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6670766-8CBD-4A53-9D3F-E17136D9A814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7BED61-D523-455A-A1FF-6A05680E2CDD",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D806FA1-7B64-44E5-9D64-66178A56B4F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52D6976-E8D2-4C83-9848-2F9250A1342D",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B82DD0-4D46-42C9-841B-D688EF6ACB29",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "511A8784-43FC-4D93-920C-60F504F20D72",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC30CB40-7BD1-4114-A24F-9B1DAF393312",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD9B17-ED60-4ABF-B446-A4F1A1484562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6418E193-CF24-4944-AC75-1C44A255713E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8099A916-BEAF-4A47-9AA8-C9370D85E20E",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A50A1C1-9946-4776-B50B-373DF3E2B131",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED70F72E-4252-413F-A932-443C7FC1E1EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99426A8-22E1-42B7-B64F-4BDDA6F17EFA",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602C4574-71E1-47F6-9ABC-CBDB0CF7C929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBE8243-D799-40F0-BC62-FEC3F8C9C280",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCA937C-83F8-4D3B-97FC-0FAF8CA60553",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "084DE83C-C05F-463D-B7A0-C536AE588A6D",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D17109-4BB6-47DB-A79B-42891EC08850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B8685D-4632-4ED9-BCAC-78D07B110FA6",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626BC816-232B-4A44-8871-06AD6A371B11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51237F2-8C54-4A87-80BB-B5F05342CE13",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82DC99F-7400-4C5A-9C49-A37E97520B15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA87B5A4-484B-4578-882C-FDC122E3C64C",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A2E43-E637-4549-8A02-7D1239201C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E7F03A-EC46-43CC-AE07-697A083C6914",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AC1855-C4B2-4CBE-A4DF-C0B302226ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C6AF35-3559-445E-A944-581983D36C25",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33557C-5627-48F4-846C-88222A2E0FFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D365F92-54F5-44A3-9998-D328ABC018DB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "848F5B8B-2ED5-42CB-99EF-5259536DDBF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798B662-B55C-40F9-BB92-67AB99FE15EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "225157CE-4339-47C9-87ED-D523598AB713",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D22A334-5E75-48D5-B32D-15FA0ABB94EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6F9B7B-4F31-4A08-857E-ADC3611E6198",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D584992-0479-4920-A9A7-824B79721194",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37619600-C2D2-468E-A094-450998DDB7F6",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12AF9DC9-10E7-4729-A0A2-C4916132452B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E99BC2-5DF3-43B4-9C05-6860B6459AFC",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09766214-250E-4E52-8E88-C854570617D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AFC889-E737-4B3C-B2AB-C6437FB8AB34",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484798F-642C-4EB3-8909-26691864938E",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928B19CB-F3F1-49EB-81E7-47B912F21F34",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2528D591-87D0-4651-8FE8-5153EB406857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6F5B3-FBDC-4123-8F18-7374EE892633",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E661E-1F6E-4DC2-AE56-AE5EBF8F344E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44487F7E-F3F7-4190-986C-7C6EB9E69CC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81501C7B-956E-4868-A7EA-7F84883452E8",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7359E866-099B-4294-8B58-3E8EFEBF7DBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D53938C-F643-4DC8-833F-D38587513037",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0880E5-6DB9-4689-91E0-7F8974176E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB34D78-B2A1-4BA6-8C45-58DAC73235C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C57E05-AD51-4AD0-87AA-A3E20022BBA2",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E25F345-124D-4943-8A81-276E65E960E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24092DE5-78A1-483F-A3A9-7C433AC7245E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664C4280-70B2-4ADA-88F7-DC00A75E9A45",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD5858-6F44-4538-A8CA-B2BB752FDC07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "905BD07A-7C27-42C9-9800-B2FEC7C254D8",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F7E4BB-3C71-4244-9D21-F868917196BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDC396-B9E0-404D-864F-03E11612286D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD20515-6864-44F3-A039-7D1EBC817044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. La informaci\u00f3n de autenticaci\u00f3n usada en una cookie es predecible y puede conllevar a un compromiso de la contrase\u00f1a del administrador cuando se captur\u00f3 en la red."
    }
  ],
  "id": "CVE-2019-16674",
  "lastModified": "2024-11-21T04:30:57.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-06T18:15:12.403",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-330"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-06 18:15
Modified
2024-11-21 04:30
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.
Impacted products
Vendor Product Version
weidmueller ie-sw-pl09m-5gc-4gt_firmware *
weidmueller ie-sw-pl09m-5gc-4gt -
weidmueller ie-sw-pl09mt-5gc-4gt_firmware *
weidmueller ie-sw-pl09mt-5gc-4gt -
weidmueller ie-sw-pl18m-2gc-16tx_firmware *
weidmueller ie-sw-pl18m-2gc-16tx -
weidmueller ie-sw-pl18mt-2gc-16tx_firmware *
weidmueller ie-sw-pl18mt-2gc-16tx -
weidmueller ie-sw-pl18m-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18m-2gc14tx2sc -
weidmueller ie-sw-pl18mt-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2sc -
weidmueller ie-sw-pl18m-2gc14tx2st_firmware *
weidmueller ie-sw-pl18m-2gc14tx2st -
weidmueller ie-sw-pl18mt-2gc14tx2st_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2st -
weidmueller ie-sw-pl18m-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18m-2gc14tx2scs -
weidmueller ie-sw-pl18mt-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2scs -
weidmueller ie-sw-pl16m-16tx_firmware *
weidmueller ie-sw-pl16m-16tx -
weidmueller ie-sw-pl16mt-16tx_firmware *
weidmueller ie-sw-pl16mt-16tx -
weidmueller ie-sw-pl16m-14tx-2sc_firmware *
weidmueller ie-sw-pl16m-14tx-2sc -
weidmueller ie-sw-pl16mt-14tx-2sc_firmware *
weidmueller ie-sw-pl16mt-14tx-2sc -
weidmueller ie-sw-pl16m-14tx-2st_firmware *
weidmueller ie-sw-pl16m-14tx-2st -
weidmueller ie-sw-pl16mt-14tx-2st_firmware *
weidmueller ie-sw-pl16mt-14tx-2st -
weidmueller ie-sw-vl05m-5tx_firmware *
weidmueller ie-sw-vl05m-5tx -
weidmueller ie-sw-vl05mt-5tx_firmware *
weidmueller ie-sw-vl05mt-5tx -
weidmueller ie-sw-vl05m-3tx-2sc_firmware *
weidmueller ie-sw-vl05m-3tx-2sc -
weidmueller ie-sw-vl05mt-3tx-2sc_firmware *
weidmueller ie-sw-vl05mt-3tx-2sc -
weidmueller ie-sw-vl05m-3tx-2st_firmware *
weidmueller ie-sw-vl05m-3tx-2st -
weidmueller ie-sw-vl05mt-3tx-2st_firmware *
weidmueller ie-sw-vl05mt-3tx-2st -
weidmueller ie-sw-vl08mt-8tx_firmware *
weidmueller ie-sw-vl08mt-8tx -
weidmueller ie-sw-vl08mt-5tx-3sc_firmware *
weidmueller ie-sw-vl08mt-5tx-3sc -
weidmueller ie-sw-vl08mt-5tx-1sc-2scs_firmware *
weidmueller ie-sw-vl08mt-5tx-1sc-2scs -
weidmueller ie-sw-vl08mt-6tx-2st_firmware *
weidmueller ie-sw-vl08mt-6tx-2st -
weidmueller ie-sw-vl08mt-6tx-2sc_firmware *
weidmueller ie-sw-vl08mt-6tx-2sc -
weidmueller ie-sw-vl08mt-6tx-2scs_firmware *
weidmueller ie-sw-vl08mt-6tx-2scs -
weidmueller ie-sw-pl08m-8tx_firmware *
weidmueller ie-sw-pl08m-8tx -
weidmueller ie-sw-pl08mt-8tx_firmware *
weidmueller ie-sw-pl08mt-8tx -
weidmueller ie-sw-pl08m-6tx-2sc_firmware *
weidmueller ie-sw-pl08m-6tx-2sc -
weidmueller ie-sw-pl08mt-6tx-2sc_firmware *
weidmueller ie-sw-pl08mt-6tx-2sc -
weidmueller ie-sw-pl08m-6tx-2st_firmware *
weidmueller ie-sw-pl08m-6tx-2st -
weidmueller ie-sw-pl08mt-6tx-2st_firmware *
weidmueller ie-sw-pl08mt-6tx-2st -
weidmueller ie-sw-pl08m-6tx-2scs_firmware *
weidmueller ie-sw-pl08m-6tx-2scs -
weidmueller ie-sw-pl08mt-6tx-2scs_firmware *
weidmueller ie-sw-pl08mt-6tx-2scs -
weidmueller ie-sw-pl10m-3gt-7tx_firmware *
weidmueller ie-sw-pl10m-3gt-7tx -
weidmueller ie-sw-pl10mt-3gt-7tx_firmware *
weidmueller ie-sw-pl10mt-3gt-7tx -
weidmueller ie-sw-pl10m-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10m-1gt-2gs-7tx -
weidmueller ie-sw-pl10mt-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10mt-1gt-2gs-7tx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31600141-CFA5-4B40-9F47-993CB2F8EAFC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6670766-8CBD-4A53-9D3F-E17136D9A814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7BED61-D523-455A-A1FF-6A05680E2CDD",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D806FA1-7B64-44E5-9D64-66178A56B4F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52D6976-E8D2-4C83-9848-2F9250A1342D",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B82DD0-4D46-42C9-841B-D688EF6ACB29",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "511A8784-43FC-4D93-920C-60F504F20D72",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC30CB40-7BD1-4114-A24F-9B1DAF393312",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD9B17-ED60-4ABF-B446-A4F1A1484562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6418E193-CF24-4944-AC75-1C44A255713E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8099A916-BEAF-4A47-9AA8-C9370D85E20E",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A50A1C1-9946-4776-B50B-373DF3E2B131",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED70F72E-4252-413F-A932-443C7FC1E1EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99426A8-22E1-42B7-B64F-4BDDA6F17EFA",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602C4574-71E1-47F6-9ABC-CBDB0CF7C929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBE8243-D799-40F0-BC62-FEC3F8C9C280",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCA937C-83F8-4D3B-97FC-0FAF8CA60553",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "084DE83C-C05F-463D-B7A0-C536AE588A6D",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D17109-4BB6-47DB-A79B-42891EC08850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B8685D-4632-4ED9-BCAC-78D07B110FA6",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626BC816-232B-4A44-8871-06AD6A371B11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51237F2-8C54-4A87-80BB-B5F05342CE13",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82DC99F-7400-4C5A-9C49-A37E97520B15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA87B5A4-484B-4578-882C-FDC122E3C64C",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A2E43-E637-4549-8A02-7D1239201C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E7F03A-EC46-43CC-AE07-697A083C6914",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AC1855-C4B2-4CBE-A4DF-C0B302226ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C6AF35-3559-445E-A944-581983D36C25",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33557C-5627-48F4-846C-88222A2E0FFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D365F92-54F5-44A3-9998-D328ABC018DB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "848F5B8B-2ED5-42CB-99EF-5259536DDBF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798B662-B55C-40F9-BB92-67AB99FE15EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "225157CE-4339-47C9-87ED-D523598AB713",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D22A334-5E75-48D5-B32D-15FA0ABB94EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6F9B7B-4F31-4A08-857E-ADC3611E6198",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D584992-0479-4920-A9A7-824B79721194",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37619600-C2D2-468E-A094-450998DDB7F6",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12AF9DC9-10E7-4729-A0A2-C4916132452B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E99BC2-5DF3-43B4-9C05-6860B6459AFC",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09766214-250E-4E52-8E88-C854570617D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AFC889-E737-4B3C-B2AB-C6437FB8AB34",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484798F-642C-4EB3-8909-26691864938E",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928B19CB-F3F1-49EB-81E7-47B912F21F34",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2528D591-87D0-4651-8FE8-5153EB406857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6F5B3-FBDC-4123-8F18-7374EE892633",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E661E-1F6E-4DC2-AE56-AE5EBF8F344E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44487F7E-F3F7-4190-986C-7C6EB9E69CC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81501C7B-956E-4868-A7EA-7F84883452E8",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7359E866-099B-4294-8B58-3E8EFEBF7DBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D53938C-F643-4DC8-833F-D38587513037",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0880E5-6DB9-4689-91E0-7F8974176E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB34D78-B2A1-4BA6-8C45-58DAC73235C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C57E05-AD51-4AD0-87AA-A3E20022BBA2",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E25F345-124D-4943-8A81-276E65E960E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24092DE5-78A1-483F-A3A9-7C433AC7245E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664C4280-70B2-4ADA-88F7-DC00A75E9A45",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD5858-6F44-4538-A8CA-B2BB752FDC07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "905BD07A-7C27-42C9-9800-B2FEC7C254D8",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F7E4BB-3C71-4244-9D21-F868917196BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDC396-B9E0-404D-864F-03E11612286D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD20515-6864-44F3-A039-7D1EBC817044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. Las contrase\u00f1as son almacenadas en texto sin cifrar y pueden ser le\u00eddas por cualquiera con acceso al dispositivo."
    }
  ],
  "id": "CVE-2019-16673",
  "lastModified": "2024-11-21T04:30:57.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-06T18:15:12.310",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-06 18:15
Modified
2024-11-21 04:30
Severity ?
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention.
Impacted products
Vendor Product Version
weidmueller ie-sw-pl09m-5gc-4gt_firmware *
weidmueller ie-sw-pl09m-5gc-4gt -
weidmueller ie-sw-pl09mt-5gc-4gt_firmware *
weidmueller ie-sw-pl09mt-5gc-4gt -
weidmueller ie-sw-pl18m-2gc-16tx_firmware *
weidmueller ie-sw-pl18m-2gc-16tx -
weidmueller ie-sw-pl18mt-2gc-16tx_firmware *
weidmueller ie-sw-pl18mt-2gc-16tx -
weidmueller ie-sw-pl18m-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18m-2gc14tx2sc -
weidmueller ie-sw-pl18mt-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2sc -
weidmueller ie-sw-pl18m-2gc14tx2st_firmware *
weidmueller ie-sw-pl18m-2gc14tx2st -
weidmueller ie-sw-pl18mt-2gc14tx2st_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2st -
weidmueller ie-sw-pl18m-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18m-2gc14tx2scs -
weidmueller ie-sw-pl18mt-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2scs -
weidmueller ie-sw-pl16m-16tx_firmware *
weidmueller ie-sw-pl16m-16tx -
weidmueller ie-sw-pl16mt-16tx_firmware *
weidmueller ie-sw-pl16mt-16tx -
weidmueller ie-sw-pl16m-14tx-2sc_firmware *
weidmueller ie-sw-pl16m-14tx-2sc -
weidmueller ie-sw-pl16mt-14tx-2sc_firmware *
weidmueller ie-sw-pl16mt-14tx-2sc -
weidmueller ie-sw-pl16m-14tx-2st_firmware *
weidmueller ie-sw-pl16m-14tx-2st -
weidmueller ie-sw-pl16mt-14tx-2st_firmware *
weidmueller ie-sw-pl16mt-14tx-2st -
weidmueller ie-sw-vl05m-5tx_firmware *
weidmueller ie-sw-vl05m-5tx -
weidmueller ie-sw-vl05mt-5tx_firmware *
weidmueller ie-sw-vl05mt-5tx -
weidmueller ie-sw-vl05m-3tx-2sc_firmware *
weidmueller ie-sw-vl05m-3tx-2sc -
weidmueller ie-sw-vl05mt-3tx-2sc_firmware *
weidmueller ie-sw-vl05mt-3tx-2sc -
weidmueller ie-sw-vl05m-3tx-2st_firmware *
weidmueller ie-sw-vl05m-3tx-2st -
weidmueller ie-sw-vl05mt-3tx-2st_firmware *
weidmueller ie-sw-vl05mt-3tx-2st -
weidmueller ie-sw-vl08mt-8tx_firmware *
weidmueller ie-sw-vl08mt-8tx -
weidmueller ie-sw-vl08mt-5tx-3sc_firmware *
weidmueller ie-sw-vl08mt-5tx-3sc -
weidmueller ie-sw-vl08mt-5tx-1sc-2scs_firmware *
weidmueller ie-sw-vl08mt-5tx-1sc-2scs -
weidmueller ie-sw-vl08mt-6tx-2st_firmware *
weidmueller ie-sw-vl08mt-6tx-2st -
weidmueller ie-sw-vl08mt-6tx-2sc_firmware *
weidmueller ie-sw-vl08mt-6tx-2sc -
weidmueller ie-sw-vl08mt-6tx-2scs_firmware *
weidmueller ie-sw-vl08mt-6tx-2scs -
weidmueller ie-sw-pl08m-8tx_firmware *
weidmueller ie-sw-pl08m-8tx -
weidmueller ie-sw-pl08mt-8tx_firmware *
weidmueller ie-sw-pl08mt-8tx -
weidmueller ie-sw-pl08m-6tx-2sc_firmware *
weidmueller ie-sw-pl08m-6tx-2sc -
weidmueller ie-sw-pl08mt-6tx-2sc_firmware *
weidmueller ie-sw-pl08mt-6tx-2sc -
weidmueller ie-sw-pl08m-6tx-2st_firmware *
weidmueller ie-sw-pl08m-6tx-2st -
weidmueller ie-sw-pl08mt-6tx-2st_firmware *
weidmueller ie-sw-pl08mt-6tx-2st -
weidmueller ie-sw-pl08m-6tx-2scs_firmware *
weidmueller ie-sw-pl08m-6tx-2scs -
weidmueller ie-sw-pl08mt-6tx-2scs_firmware *
weidmueller ie-sw-pl08mt-6tx-2scs -
weidmueller ie-sw-pl10m-3gt-7tx_firmware *
weidmueller ie-sw-pl10m-3gt-7tx -
weidmueller ie-sw-pl10mt-3gt-7tx_firmware *
weidmueller ie-sw-pl10mt-3gt-7tx -
weidmueller ie-sw-pl10m-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10m-1gt-2gs-7tx -
weidmueller ie-sw-pl10mt-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10mt-1gt-2gs-7tx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31600141-CFA5-4B40-9F47-993CB2F8EAFC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6670766-8CBD-4A53-9D3F-E17136D9A814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7BED61-D523-455A-A1FF-6A05680E2CDD",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D806FA1-7B64-44E5-9D64-66178A56B4F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52D6976-E8D2-4C83-9848-2F9250A1342D",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B82DD0-4D46-42C9-841B-D688EF6ACB29",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "511A8784-43FC-4D93-920C-60F504F20D72",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC30CB40-7BD1-4114-A24F-9B1DAF393312",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD9B17-ED60-4ABF-B446-A4F1A1484562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6418E193-CF24-4944-AC75-1C44A255713E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8099A916-BEAF-4A47-9AA8-C9370D85E20E",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A50A1C1-9946-4776-B50B-373DF3E2B131",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED70F72E-4252-413F-A932-443C7FC1E1EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99426A8-22E1-42B7-B64F-4BDDA6F17EFA",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602C4574-71E1-47F6-9ABC-CBDB0CF7C929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBE8243-D799-40F0-BC62-FEC3F8C9C280",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCA937C-83F8-4D3B-97FC-0FAF8CA60553",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "084DE83C-C05F-463D-B7A0-C536AE588A6D",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D17109-4BB6-47DB-A79B-42891EC08850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B8685D-4632-4ED9-BCAC-78D07B110FA6",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626BC816-232B-4A44-8871-06AD6A371B11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51237F2-8C54-4A87-80BB-B5F05342CE13",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82DC99F-7400-4C5A-9C49-A37E97520B15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA87B5A4-484B-4578-882C-FDC122E3C64C",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A2E43-E637-4549-8A02-7D1239201C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E7F03A-EC46-43CC-AE07-697A083C6914",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AC1855-C4B2-4CBE-A4DF-C0B302226ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C6AF35-3559-445E-A944-581983D36C25",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33557C-5627-48F4-846C-88222A2E0FFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D365F92-54F5-44A3-9998-D328ABC018DB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "848F5B8B-2ED5-42CB-99EF-5259536DDBF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798B662-B55C-40F9-BB92-67AB99FE15EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "225157CE-4339-47C9-87ED-D523598AB713",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D22A334-5E75-48D5-B32D-15FA0ABB94EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6F9B7B-4F31-4A08-857E-ADC3611E6198",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D584992-0479-4920-A9A7-824B79721194",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37619600-C2D2-468E-A094-450998DDB7F6",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12AF9DC9-10E7-4729-A0A2-C4916132452B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E99BC2-5DF3-43B4-9C05-6860B6459AFC",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09766214-250E-4E52-8E88-C854570617D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AFC889-E737-4B3C-B2AB-C6437FB8AB34",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484798F-642C-4EB3-8909-26691864938E",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928B19CB-F3F1-49EB-81E7-47B912F21F34",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2528D591-87D0-4651-8FE8-5153EB406857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6F5B3-FBDC-4123-8F18-7374EE892633",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E661E-1F6E-4DC2-AE56-AE5EBF8F344E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44487F7E-F3F7-4190-986C-7C6EB9E69CC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81501C7B-956E-4868-A7EA-7F84883452E8",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7359E866-099B-4294-8B58-3E8EFEBF7DBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D53938C-F643-4DC8-833F-D38587513037",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0880E5-6DB9-4689-91E0-7F8974176E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB34D78-B2A1-4BA6-8C45-58DAC73235C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C57E05-AD51-4AD0-87AA-A3E20022BBA2",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E25F345-124D-4943-8A81-276E65E960E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24092DE5-78A1-483F-A3A9-7C433AC7245E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664C4280-70B2-4ADA-88F7-DC00A75E9A45",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD5858-6F44-4538-A8CA-B2BB752FDC07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "905BD07A-7C27-42C9-9800-B2FEC7C254D8",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F7E4BB-3C71-4244-9D21-F868917196BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDC396-B9E0-404D-864F-03E11612286D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD20515-6864-44F3-A039-7D1EBC817044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. El mecanismo de autenticaci\u00f3n no posee prevenci\u00f3n de ataques de fuerza bruta."
    }
  ],
  "id": "CVE-2019-16670",
  "lastModified": "2024-11-21T04:30:56.453",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-06T18:15:11.887",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-307"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-06 18:15
Modified
2024-11-21 04:30
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.
Impacted products
Vendor Product Version
weidmueller ie-sw-pl09m-5gc-4gt_firmware *
weidmueller ie-sw-pl09m-5gc-4gt -
weidmueller ie-sw-pl09mt-5gc-4gt_firmware *
weidmueller ie-sw-pl09mt-5gc-4gt -
weidmueller ie-sw-pl18m-2gc-16tx_firmware *
weidmueller ie-sw-pl18m-2gc-16tx -
weidmueller ie-sw-pl18mt-2gc-16tx_firmware *
weidmueller ie-sw-pl18mt-2gc-16tx -
weidmueller ie-sw-pl18m-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18m-2gc14tx2sc -
weidmueller ie-sw-pl18mt-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2sc -
weidmueller ie-sw-pl18m-2gc14tx2st_firmware *
weidmueller ie-sw-pl18m-2gc14tx2st -
weidmueller ie-sw-pl18mt-2gc14tx2st_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2st -
weidmueller ie-sw-pl18m-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18m-2gc14tx2scs -
weidmueller ie-sw-pl18mt-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2scs -
weidmueller ie-sw-pl16m-16tx_firmware *
weidmueller ie-sw-pl16m-16tx -
weidmueller ie-sw-pl16mt-16tx_firmware *
weidmueller ie-sw-pl16mt-16tx -
weidmueller ie-sw-pl16m-14tx-2sc_firmware *
weidmueller ie-sw-pl16m-14tx-2sc -
weidmueller ie-sw-pl16mt-14tx-2sc_firmware *
weidmueller ie-sw-pl16mt-14tx-2sc -
weidmueller ie-sw-pl16m-14tx-2st_firmware *
weidmueller ie-sw-pl16m-14tx-2st -
weidmueller ie-sw-pl16mt-14tx-2st_firmware *
weidmueller ie-sw-pl16mt-14tx-2st -
weidmueller ie-sw-vl05m-5tx_firmware *
weidmueller ie-sw-vl05m-5tx -
weidmueller ie-sw-vl05mt-5tx_firmware *
weidmueller ie-sw-vl05mt-5tx -
weidmueller ie-sw-vl05m-3tx-2sc_firmware *
weidmueller ie-sw-vl05m-3tx-2sc -
weidmueller ie-sw-vl05mt-3tx-2sc_firmware *
weidmueller ie-sw-vl05mt-3tx-2sc -
weidmueller ie-sw-vl05m-3tx-2st_firmware *
weidmueller ie-sw-vl05m-3tx-2st -
weidmueller ie-sw-vl05mt-3tx-2st_firmware *
weidmueller ie-sw-vl05mt-3tx-2st -
weidmueller ie-sw-vl08mt-8tx_firmware *
weidmueller ie-sw-vl08mt-8tx -
weidmueller ie-sw-vl08mt-5tx-3sc_firmware *
weidmueller ie-sw-vl08mt-5tx-3sc -
weidmueller ie-sw-vl08mt-5tx-1sc-2scs_firmware *
weidmueller ie-sw-vl08mt-5tx-1sc-2scs -
weidmueller ie-sw-vl08mt-6tx-2st_firmware *
weidmueller ie-sw-vl08mt-6tx-2st -
weidmueller ie-sw-vl08mt-6tx-2sc_firmware *
weidmueller ie-sw-vl08mt-6tx-2sc -
weidmueller ie-sw-vl08mt-6tx-2scs_firmware *
weidmueller ie-sw-vl08mt-6tx-2scs -
weidmueller ie-sw-pl08m-8tx_firmware *
weidmueller ie-sw-pl08m-8tx -
weidmueller ie-sw-pl08mt-8tx_firmware *
weidmueller ie-sw-pl08mt-8tx -
weidmueller ie-sw-pl08m-6tx-2sc_firmware *
weidmueller ie-sw-pl08m-6tx-2sc -
weidmueller ie-sw-pl08mt-6tx-2sc_firmware *
weidmueller ie-sw-pl08mt-6tx-2sc -
weidmueller ie-sw-pl08m-6tx-2st_firmware *
weidmueller ie-sw-pl08m-6tx-2st -
weidmueller ie-sw-pl08mt-6tx-2st_firmware *
weidmueller ie-sw-pl08mt-6tx-2st -
weidmueller ie-sw-pl08m-6tx-2scs_firmware *
weidmueller ie-sw-pl08m-6tx-2scs -
weidmueller ie-sw-pl08mt-6tx-2scs_firmware *
weidmueller ie-sw-pl08mt-6tx-2scs -
weidmueller ie-sw-pl10m-3gt-7tx_firmware *
weidmueller ie-sw-pl10m-3gt-7tx -
weidmueller ie-sw-pl10mt-3gt-7tx_firmware *
weidmueller ie-sw-pl10mt-3gt-7tx -
weidmueller ie-sw-pl10m-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10m-1gt-2gs-7tx -
weidmueller ie-sw-pl10mt-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10mt-1gt-2gs-7tx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31600141-CFA5-4B40-9F47-993CB2F8EAFC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6670766-8CBD-4A53-9D3F-E17136D9A814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7BED61-D523-455A-A1FF-6A05680E2CDD",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D806FA1-7B64-44E5-9D64-66178A56B4F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52D6976-E8D2-4C83-9848-2F9250A1342D",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B82DD0-4D46-42C9-841B-D688EF6ACB29",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "511A8784-43FC-4D93-920C-60F504F20D72",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC30CB40-7BD1-4114-A24F-9B1DAF393312",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD9B17-ED60-4ABF-B446-A4F1A1484562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6418E193-CF24-4944-AC75-1C44A255713E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8099A916-BEAF-4A47-9AA8-C9370D85E20E",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A50A1C1-9946-4776-B50B-373DF3E2B131",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED70F72E-4252-413F-A932-443C7FC1E1EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99426A8-22E1-42B7-B64F-4BDDA6F17EFA",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602C4574-71E1-47F6-9ABC-CBDB0CF7C929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBE8243-D799-40F0-BC62-FEC3F8C9C280",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCA937C-83F8-4D3B-97FC-0FAF8CA60553",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "084DE83C-C05F-463D-B7A0-C536AE588A6D",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D17109-4BB6-47DB-A79B-42891EC08850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B8685D-4632-4ED9-BCAC-78D07B110FA6",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626BC816-232B-4A44-8871-06AD6A371B11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51237F2-8C54-4A87-80BB-B5F05342CE13",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82DC99F-7400-4C5A-9C49-A37E97520B15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA87B5A4-484B-4578-882C-FDC122E3C64C",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A2E43-E637-4549-8A02-7D1239201C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E7F03A-EC46-43CC-AE07-697A083C6914",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AC1855-C4B2-4CBE-A4DF-C0B302226ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C6AF35-3559-445E-A944-581983D36C25",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33557C-5627-48F4-846C-88222A2E0FFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D365F92-54F5-44A3-9998-D328ABC018DB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "848F5B8B-2ED5-42CB-99EF-5259536DDBF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798B662-B55C-40F9-BB92-67AB99FE15EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "225157CE-4339-47C9-87ED-D523598AB713",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D22A334-5E75-48D5-B32D-15FA0ABB94EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6F9B7B-4F31-4A08-857E-ADC3611E6198",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D584992-0479-4920-A9A7-824B79721194",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37619600-C2D2-468E-A094-450998DDB7F6",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12AF9DC9-10E7-4729-A0A2-C4916132452B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E99BC2-5DF3-43B4-9C05-6860B6459AFC",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09766214-250E-4E52-8E88-C854570617D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AFC889-E737-4B3C-B2AB-C6437FB8AB34",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484798F-642C-4EB3-8909-26691864938E",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928B19CB-F3F1-49EB-81E7-47B912F21F34",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2528D591-87D0-4651-8FE8-5153EB406857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6F5B3-FBDC-4123-8F18-7374EE892633",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E661E-1F6E-4DC2-AE56-AE5EBF8F344E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44487F7E-F3F7-4190-986C-7C6EB9E69CC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81501C7B-956E-4868-A7EA-7F84883452E8",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7359E866-099B-4294-8B58-3E8EFEBF7DBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D53938C-F643-4DC8-833F-D38587513037",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0880E5-6DB9-4689-91E0-7F8974176E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB34D78-B2A1-4BA6-8C45-58DAC73235C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C57E05-AD51-4AD0-87AA-A3E20022BBA2",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E25F345-124D-4943-8A81-276E65E960E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24092DE5-78A1-483F-A3A9-7C433AC7245E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664C4280-70B2-4ADA-88F7-DC00A75E9A45",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD5858-6F44-4538-A8CA-B2BB752FDC07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "905BD07A-7C27-42C9-9800-B2FEC7C254D8",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F7E4BB-3C71-4244-9D21-F868917196BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDC396-B9E0-404D-864F-03E11612286D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD20515-6864-44F3-A039-7D1EBC817044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. Los usuarios autenticados remotos pueden bloquear un dispositivo con un paquete especial debido a un Consumo de Recursos No Controlados."
    }
  ],
  "id": "CVE-2019-16671",
  "lastModified": "2024-11-21T04:30:56.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-06T18:15:12.107",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-06 18:15
Modified
2024-11-21 04:30
Severity ?
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.
Impacted products
Vendor Product Version
weidmueller ie-sw-pl09m-5gc-4gt_firmware *
weidmueller ie-sw-pl09m-5gc-4gt -
weidmueller ie-sw-pl09mt-5gc-4gt_firmware *
weidmueller ie-sw-pl09mt-5gc-4gt -
weidmueller ie-sw-pl18m-2gc-16tx_firmware *
weidmueller ie-sw-pl18m-2gc-16tx -
weidmueller ie-sw-pl18mt-2gc-16tx_firmware *
weidmueller ie-sw-pl18mt-2gc-16tx -
weidmueller ie-sw-pl18m-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18m-2gc14tx2sc -
weidmueller ie-sw-pl18mt-2gc14tx2sc_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2sc -
weidmueller ie-sw-pl18m-2gc14tx2st_firmware *
weidmueller ie-sw-pl18m-2gc14tx2st -
weidmueller ie-sw-pl18mt-2gc14tx2st_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2st -
weidmueller ie-sw-pl18m-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18m-2gc14tx2scs -
weidmueller ie-sw-pl18mt-2gc14tx2scs_firmware *
weidmueller ie-sw-pl18mt-2gc14tx2scs -
weidmueller ie-sw-pl16m-16tx_firmware *
weidmueller ie-sw-pl16m-16tx -
weidmueller ie-sw-pl16mt-16tx_firmware *
weidmueller ie-sw-pl16mt-16tx -
weidmueller ie-sw-pl16m-14tx-2sc_firmware *
weidmueller ie-sw-pl16m-14tx-2sc -
weidmueller ie-sw-pl16mt-14tx-2sc_firmware *
weidmueller ie-sw-pl16mt-14tx-2sc -
weidmueller ie-sw-pl16m-14tx-2st_firmware *
weidmueller ie-sw-pl16m-14tx-2st -
weidmueller ie-sw-pl16mt-14tx-2st_firmware *
weidmueller ie-sw-pl16mt-14tx-2st -
weidmueller ie-sw-vl05m-5tx_firmware *
weidmueller ie-sw-vl05m-5tx -
weidmueller ie-sw-vl05mt-5tx_firmware *
weidmueller ie-sw-vl05mt-5tx -
weidmueller ie-sw-vl05m-3tx-2sc_firmware *
weidmueller ie-sw-vl05m-3tx-2sc -
weidmueller ie-sw-vl05mt-3tx-2sc_firmware *
weidmueller ie-sw-vl05mt-3tx-2sc -
weidmueller ie-sw-vl05m-3tx-2st_firmware *
weidmueller ie-sw-vl05m-3tx-2st -
weidmueller ie-sw-vl05mt-3tx-2st_firmware *
weidmueller ie-sw-vl05mt-3tx-2st -
weidmueller ie-sw-vl08mt-8tx_firmware *
weidmueller ie-sw-vl08mt-8tx -
weidmueller ie-sw-vl08mt-5tx-3sc_firmware *
weidmueller ie-sw-vl08mt-5tx-3sc -
weidmueller ie-sw-vl08mt-5tx-1sc-2scs_firmware *
weidmueller ie-sw-vl08mt-5tx-1sc-2scs -
weidmueller ie-sw-vl08mt-6tx-2st_firmware *
weidmueller ie-sw-vl08mt-6tx-2st -
weidmueller ie-sw-vl08mt-6tx-2sc_firmware *
weidmueller ie-sw-vl08mt-6tx-2sc -
weidmueller ie-sw-vl08mt-6tx-2scs_firmware *
weidmueller ie-sw-vl08mt-6tx-2scs -
weidmueller ie-sw-pl08m-8tx_firmware *
weidmueller ie-sw-pl08m-8tx -
weidmueller ie-sw-pl08mt-8tx_firmware *
weidmueller ie-sw-pl08mt-8tx -
weidmueller ie-sw-pl08m-6tx-2sc_firmware *
weidmueller ie-sw-pl08m-6tx-2sc -
weidmueller ie-sw-pl08mt-6tx-2sc_firmware *
weidmueller ie-sw-pl08mt-6tx-2sc -
weidmueller ie-sw-pl08m-6tx-2st_firmware *
weidmueller ie-sw-pl08m-6tx-2st -
weidmueller ie-sw-pl08mt-6tx-2st_firmware *
weidmueller ie-sw-pl08mt-6tx-2st -
weidmueller ie-sw-pl08m-6tx-2scs_firmware *
weidmueller ie-sw-pl08m-6tx-2scs -
weidmueller ie-sw-pl08mt-6tx-2scs_firmware *
weidmueller ie-sw-pl08mt-6tx-2scs -
weidmueller ie-sw-pl10m-3gt-7tx_firmware *
weidmueller ie-sw-pl10m-3gt-7tx -
weidmueller ie-sw-pl10mt-3gt-7tx_firmware *
weidmueller ie-sw-pl10mt-3gt-7tx -
weidmueller ie-sw-pl10m-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10m-1gt-2gs-7tx -
weidmueller ie-sw-pl10mt-1gt-2gs-7tx_firmware *
weidmueller ie-sw-pl10mt-1gt-2gs-7tx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31600141-CFA5-4B40-9F47-993CB2F8EAFC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6670766-8CBD-4A53-9D3F-E17136D9A814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7BED61-D523-455A-A1FF-6A05680E2CDD",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D806FA1-7B64-44E5-9D64-66178A56B4F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52D6976-E8D2-4C83-9848-2F9250A1342D",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B82DD0-4D46-42C9-841B-D688EF6ACB29",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "511A8784-43FC-4D93-920C-60F504F20D72",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC30CB40-7BD1-4114-A24F-9B1DAF393312",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECD9B17-ED60-4ABF-B446-A4F1A1484562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6418E193-CF24-4944-AC75-1C44A255713E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8099A916-BEAF-4A47-9AA8-C9370D85E20E",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A50A1C1-9946-4776-B50B-373DF3E2B131",
              "versionEndIncluding": "3.4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED70F72E-4252-413F-A932-443C7FC1E1EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99426A8-22E1-42B7-B64F-4BDDA6F17EFA",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602C4574-71E1-47F6-9ABC-CBDB0CF7C929",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBE8243-D799-40F0-BC62-FEC3F8C9C280",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCA937C-83F8-4D3B-97FC-0FAF8CA60553",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "084DE83C-C05F-463D-B7A0-C536AE588A6D",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D17109-4BB6-47DB-A79B-42891EC08850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B8685D-4632-4ED9-BCAC-78D07B110FA6",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626BC816-232B-4A44-8871-06AD6A371B11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51237F2-8C54-4A87-80BB-B5F05342CE13",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E82DC99F-7400-4C5A-9C49-A37E97520B15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA87B5A4-484B-4578-882C-FDC122E3C64C",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A2E43-E637-4549-8A02-7D1239201C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E7F03A-EC46-43CC-AE07-697A083C6914",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AC1855-C4B2-4CBE-A4DF-C0B302226ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C6AF35-3559-445E-A944-581983D36C25",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33557C-5627-48F4-846C-88222A2E0FFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D365F92-54F5-44A3-9998-D328ABC018DB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "848F5B8B-2ED5-42CB-99EF-5259536DDBF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9",
              "versionEndIncluding": "3.6.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F798B662-B55C-40F9-BB92-67AB99FE15EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "225157CE-4339-47C9-87ED-D523598AB713",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D22A334-5E75-48D5-B32D-15FA0ABB94EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6F9B7B-4F31-4A08-857E-ADC3611E6198",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D584992-0479-4920-A9A7-824B79721194",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37619600-C2D2-468E-A094-450998DDB7F6",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12AF9DC9-10E7-4729-A0A2-C4916132452B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E99BC2-5DF3-43B4-9C05-6860B6459AFC",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09766214-250E-4E52-8E88-C854570617D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AFC889-E737-4B3C-B2AB-C6437FB8AB34",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484798F-642C-4EB3-8909-26691864938E",
              "versionEndIncluding": "3.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928B19CB-F3F1-49EB-81E7-47B912F21F34",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2528D591-87D0-4651-8FE8-5153EB406857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6F5B3-FBDC-4123-8F18-7374EE892633",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E661E-1F6E-4DC2-AE56-AE5EBF8F344E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44487F7E-F3F7-4190-986C-7C6EB9E69CC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81501C7B-956E-4868-A7EA-7F84883452E8",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7359E866-099B-4294-8B58-3E8EFEBF7DBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D53938C-F643-4DC8-833F-D38587513037",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0880E5-6DB9-4689-91E0-7F8974176E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACB34D78-B2A1-4BA6-8C45-58DAC73235C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C57E05-AD51-4AD0-87AA-A3E20022BBA2",
              "versionEndIncluding": "3.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E25F345-124D-4943-8A81-276E65E960E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24092DE5-78A1-483F-A3A9-7C433AC7245E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "664C4280-70B2-4ADA-88F7-DC00A75E9A45",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDD5858-6F44-4538-A8CA-B2BB752FDC07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "905BD07A-7C27-42C9-9800-B2FEC7C254D8",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F7E4BB-3C71-4244-9D21-F868917196BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDC396-B9E0-404D-864F-03E11612286D",
              "versionEndIncluding": "3.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD20515-6864-44F3-A039-7D1EBC817044",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. Los datos de Credenciales Confidenciales son transmitidos en texto sin cifrar."
    }
  ],
  "id": "CVE-2019-16672",
  "lastModified": "2024-11-21T04:30:56.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-06T18:15:12.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-319"
        },
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}