All the vulnerabilites related to Siemens - OZW672
var-201708-1510
Vulnerability from variot
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. Siemens OZW672 and OZW772 Contains a cryptographic vulnerability.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There is a man-in-the-middle attack vulnerability in Siemens OZW672 and OZW772. Multiple Siemens OZW672 and OZW772 are prone to multiple authentication-bypass vulnerabilities. An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1510", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw672", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ozw672", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": null } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006993" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck from SEC Consult.", "sources": [ { "db": "BID", "id": "99473" } ], "trust": 0.3 }, "cve": "CVE-2017-6873", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-6873", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2017-12866", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-115076", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2017-6873", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6873", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-6873", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-12866", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201703-624", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-115076", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-6873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. Siemens OZW672 and OZW772 Contains a cryptographic vulnerability.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There is a man-in-the-middle attack vulnerability in Siemens OZW672 and OZW772. Multiple Siemens OZW672 and OZW772 are prone to multiple authentication-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2017-6873" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "BID", "id": "99473" }, { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6873", "trust": 3.7 }, { "db": "SIEMENS", "id": "SSA-563539", "trust": 2.7 }, { "db": "BID", "id": "99473", "trust": 2.1 }, { "db": "ICS CERT", "id": "ICSA-17-187-01", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-201703-624", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-12866", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-006993", "trust": 0.8 }, { "db": "IVD", "id": "B6AAB7B7-CD78-4139-9B22-D94F00E179D1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-115076", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-6873", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "id": "VAR-201708-1510", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" } ] }, "last_update_date": "2024-11-23T21:40:29.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-563539", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "title": "Patch for Siemens OZW672 and OZW772 man-in-the-middle attack vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/97345" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115076" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/99473" }, { "trust": 1.2, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-187-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6873" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6873" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12866" }, { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-115076" }, { "date": "2017-08-08T00:00:00", "db": "VULMON", "id": "CVE-2017-6873" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "date": "2017-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-624" }, { "date": "2017-08-08T00:29:00.320000", "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12866" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-115076" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2017-6873" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-624" }, { "date": "2024-11-21T03:30:42.440000", "db": "NVD", "id": "CVE-2017-6873" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-624" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Cryptographic vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006993" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-624" } ], "trust": 0.6 } }
var-201708-1509
Vulnerability from variot
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device. Siemens OZW672 and OZW772 Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There are data read and write vulnerabilities in Siemens OZW672 and OZW772. An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. A security vulnerability exists in Siemens OZW672 and OZW772 devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1509", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ozw672", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": null } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007020" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck from SEC Consult.", "sources": [ { "db": "BID", "id": "99473" } ], "trust": 0.3 }, "cve": "CVE-2017-6872", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-6872", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-12867", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7002627a-a56c-43fd-b57e-9336b0866e9e", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-115075", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2017-6872", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6872", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-6872", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-12867", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201703-625", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-115075", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device. Siemens OZW672 and OZW772 Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There are data read and write vulnerabilities in Siemens OZW672 and OZW772. \nAn attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. A security vulnerability exists in Siemens OZW672 and OZW772 devices", "sources": [ { "db": "NVD", "id": "CVE-2017-6872" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "BID", "id": "99473" }, { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "VULHUB", "id": "VHN-115075" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6872", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-563539", "trust": 2.6 }, { "db": "BID", "id": "99473", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201703-625", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-12867", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-007020", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-187-01", "trust": 0.3 }, { "db": "IVD", "id": "7002627A-A56C-43FD-B57E-9336B0866E9E", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-115075", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "id": "VAR-201708-1509", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" } ] }, "last_update_date": "2024-11-23T21:40:29.796000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-563539", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "title": "Patch for SiemensOZW672 and OZW772 data read and write vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/97346" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115075" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/99473" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6872" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6872" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-187-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12867" }, { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-115075" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "date": "2017-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-625" }, { "date": "2017-08-08T00:29:00.290000", "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12867" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-115075" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-625" }, { "date": "2024-11-21T03:30:42.320000", "db": "NVD", "id": "CVE-2017-6872" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-625" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-625" } ], "trust": 0.6 } }
var-202002-1475
Vulnerability from variot
A vulnerability has been identified in OZW672 (All versions < V10.00), OZW772 (All versions < V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application's export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. OZW672 and OZW772 Contains vulnerabilities in externally accessible files or directories.Information may be obtained. Siemens OZW672 and OZW772 are the building controller products of Germany's Siemens
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-1475", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "10.00" }, { "model": "ozw772", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v10.00" }, { "model": "ozw772", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v10.00" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": "*" } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" } ] }, "cve": "CVE-2019-13941", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-13941", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-014548", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-15262", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-13941", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2019-014548", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13941", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2019-014548", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-15262", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202002-454", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. OZW672 and OZW772 Contains vulnerabilities in externally accessible files or directories.Information may be obtained. Siemens OZW672 and OZW772 are the building controller products of Germany\u0027s Siemens", "sources": [ { "db": "NVD", "id": "CVE-2019-13941" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13941", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-042-09", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-986695", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2020-15262", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-454", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014548", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0486", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0486.3", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0486.2", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-06", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-07", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-10", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-02", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-05", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-08", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-04", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-03", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-01", "trust": 0.6 }, { "db": "IVD", "id": "9D70A0CB-14C2-49AD-8202-3AE7B396C3AD", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "id": "VAR-202002-1475", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" } ], "trust": 1.425 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" } ] }, "last_update_date": "2024-11-23T21:21:04.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-986695", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "title": "Patch for Siemens OZW672 and OZW772 Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/206793" }, { "title": "Siemens OZW672 and OZW772 Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110189" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-552", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" }, { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13941" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13941" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-10" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-08" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-07" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-06" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-05" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-04" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-03" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-02" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486.3/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-11T00:00:00", "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "date": "2020-03-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-15262" }, { "date": "2020-02-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-454" }, { "date": "2020-02-11T16:15:14.897000", "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-15262" }, { "date": "2020-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-454" }, { "date": "2024-11-21T04:25:44.447000", "db": "NVD", "id": "CVE-2019-13941" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-454" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OZW672 and OZW772 Vulnerability in externally accessible files or directories in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-454" } ], "trust": 0.6 } }
var-202411-0737
Vulnerability from variot
A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.
This could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens' OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning.
Siemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0737", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw672", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2" }, { "model": "ozw772", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2" }, { "model": "ozw772", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ozw672", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "cve": "CVE-2024-36140", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2024-45220", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2024-36140", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.3, "id": "CVE-2024-36140", "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2024-36140", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-36140", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-36140", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-36140", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-45220", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks. \r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens\u0027 OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning. \n\nSiemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code", "sources": [ { "db": "NVD", "id": "CVE-2024-36140" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "CNVD", "id": "CNVD-2024-45220" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-36140", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-230445", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-03", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012845", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-45220", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "id": "VAR-202411-0737", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ], "trust": 1.225 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ] }, "last_update_date": "2024-11-28T20:10:13.609000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens OZW devices (web servers) cross-site scripting vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617291" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-36140" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-03" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45220" }, { "date": "2024-11-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "date": "2024-11-12T13:15:07.957000", "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45220" }, { "date": "2024-11-18T04:46:00", "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "date": "2024-11-15T22:53:26.063000", "db": "NVD", "id": "CVE-2024-36140" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens\u0027 \u00a0OZW672\u00a0 firmware and \u00a0OZW772\u00a0 Cross-site scripting vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012845" } ], "trust": 0.8 } }
var-201601-0459
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. A cross-site scripting vulnerability exists in the Siemens OZW672 and OZW772 devices. The vulnerability could be exploited by a remote attacker to change data and settings. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0459", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.2" }, { "model": "ozw672", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.2" }, { "model": "ozw672", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "6.00" }, { "model": "ozw772", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "6.00" }, { "model": "ozw672", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": "*" } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:siemens:ozw672", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:ozw772", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001549" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aditya Sood", "sources": [ { "db": "BID", "id": "80915" } ], "trust": 0.3 }, "cve": "CVE-2016-1488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2016-1488", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-00391", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "62b00c84-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-90307", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2016-1488", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1488", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-1488", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-00391", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201601-367", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90307", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. A cross-site scripting vulnerability exists in the Siemens OZW672 and OZW772 devices. The vulnerability could be exploited by a remote attacker to change data and settings. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks", "sources": [ { "db": "NVD", "id": "CVE-2016-1488" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "BID", "id": "80915" }, { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-90307" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1488", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-019-01", "trust": 3.1 }, { "db": "SIEMENS", "id": "SSA-743465", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201601-367", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-00391", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-001549", "trust": 0.8 }, { "db": "BID", "id": "80915", "trust": 0.4 }, { "db": "IVD", "id": "62B00C84-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-90307", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "id": "VAR-201601-0459", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" } ] }, "last_update_date": "2024-11-23T23:02:38.773000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-743465", "trust": 0.8, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "title": "Patch for SiemensOZW672 and OZW772 cross-site scripting vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/70337" }, { "title": "Siemens OZW672 and OZW772 Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59685" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90307" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-019-01" }, { "trust": 1.7, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1488" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1488" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-21T00:00:00", "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-00391" }, { "date": "2016-01-30T00:00:00", "db": "VULHUB", "id": "VHN-90307" }, { "date": "2016-01-15T00:00:00", "db": "BID", "id": "80915" }, { "date": "2016-03-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "date": "2016-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-367" }, { "date": "2016-01-30T12:59:03.103000", "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-00391" }, { "date": "2016-03-04T00:00:00", "db": "VULHUB", "id": "VHN-90307" }, { "date": "2016-02-11T07:36:00", "db": "BID", "id": "80915" }, { "date": "2016-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "date": "2016-02-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-367" }, { "date": "2024-11-21T02:46:32.177000", "db": "NVD", "id": "CVE-2016-1488" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 0.6 } }
cve-2016-1488
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01 | x_refsource_MISC | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-01-30T11:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1488", "datePublished": "2016-01-30T11:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13941
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf | x_refsource_MISC | |
https://www.us-cert.gov/ics/advisories/icsa-20-042-09 | x_refsource_MISC |
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Siemens AG | OZW672 |
Version: All versions < V10.00 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:05:43.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V10.00" } ] }, { "product": "OZW772", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V10.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-10T19:16:14", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-13941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672", "version": { "version_data": [ { "version_value": "All versions \u003c V10.00" } ] } }, { "product_name": "OZW772", "version": { "version_data": [ { "version_value": "All versions \u003c V10.00" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-552: Files or Directories Accessible to External Parties" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-13941", "datePublished": "2020-02-11T15:36:10", "dateReserved": "2019-07-18T00:00:00", "dateUpdated": "2024-08-05T00:05:43.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36140
Vulnerability from cvelistv5
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ozw672", "vendor": "siemens", "versions": [ { "lessThan": "v5.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ozw772", "vendor": "siemens", "versions": [ { "lessThan": "v5.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:33:05.874776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:35:44.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "OZW672", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "OZW772", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:49:32.130Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-36140", "datePublished": "2024-11-12T12:49:32.130Z", "dateReserved": "2024-05-21T11:44:14.682Z", "dateUpdated": "2024-11-12T14:35:44.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6872
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99473 | vdb-entry, x_refsource_BID | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | OZW672, OZW772 |
Version: OZW672, OZW772 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672, OZW772", "vendor": "n/a", "versions": [ { "status": "affected", "version": "OZW672, OZW772" } ] } ], "datePublic": "2017-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2017-6872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672, OZW772", "version": { "version_data": [ { "version_value": "OZW672, OZW772" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "99473", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99473" }, { "name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf", "refsource": "CONFIRM", "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2017-6872", "datePublished": "2017-08-08T00:00:00", "dateReserved": "2017-03-13T00:00:00", "dateUpdated": "2024-08-05T15:41:17.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6873
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99473 | vdb-entry, x_refsource_BID | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | OZW672, OZW772 |
Version: OZW672, OZW772 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672, OZW772", "vendor": "n/a", "versions": [ { "status": "affected", "version": "OZW672, OZW772" } ] } ], "datePublic": "2017-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2017-6873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672, OZW772", "version": { "version_data": [ { "version_value": "OZW672, OZW772" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "99473", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99473" }, { "name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf", "refsource": "CONFIRM", "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2017-6873", "datePublished": "2017-08-08T00:00:00", "dateReserved": "2017-03-13T00:00:00", "dateUpdated": "2024-08-05T15:41:17.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }