Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-3658 (GCVE-0-2018-3658)
Vulnerability from cvelistv5
- Denial of Service, Information Disclosure
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3658", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T22:35:54.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-3658\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-09-12T19:29:02.967\",\"lastModified\":\"2024-11-21T04:05:51.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegaci\u00f3n de servicio (DoS) parcial mediante acceso de red.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.01.06\",\"matchCriteriaId\":\"503E551C-FC5F-4ABC-8DEA-E360701F0B33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506DEE00-30D2-4E29-9645-757EB8778C0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.09\",\"matchCriteriaId\":\"33F546AF-8F80-4E0A-9B92-86E3A1F931C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40D0CDB-7BE6-491F-B730-3B4E10CA159A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.09\",\"matchCriteriaId\":\"6B5B6E6B-16A0-4236-AABE-82385B53EC78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF9D4C3-1892-48FA-95B4-835B636A4005\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r1.30.0\",\"matchCriteriaId\":\"D476D093-4A97-499C-B40D-7A301BC9AA2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A757F1-E478-4A3D-8D5F-C996E176A11A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r1.23.0\",\"matchCriteriaId\":\"30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB339B5-602F-4AB5-9998-465FDC6ABD6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"790D244A-AC3D-4BBC-9139-A90048FD375A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509AD120-3465-4C00-AAB3-B6F6ED708B51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.01.14\",\"matchCriteriaId\":\"0C046182-BB33-41D0-B041-1566B8041917\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EF28FB-BAB3-4710-9D25-25F67ACADC60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"8DE74300-E061-452E-AD1D-6DD7C2C62729\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057D9947-CE4A-4B4C-B721-4B29FB71350C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"BE4A7C13-6F81-4629-9C28-9202028634AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D87239-40C1-4038-B734-D77AC4DDD571\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.01.14\",\"matchCriteriaId\":\"93485235-481B-4BAF-BB7A-81BB5AA1BC53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F37D88-E086-4060-8420-BD0F8D8FF580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.01.04\",\"matchCriteriaId\":\"AD949046-46E5-48C9-883B-92F04926E8BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187C6D51-5B86-484D-AE0F-26D1C9465580\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"12.0.5\",\"matchCriteriaId\":\"C23AFAB4-B286-4FD6-ABC3-86B2881E271C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.5\",\"matchCriteriaId\":\"D5FAD938-027A-406F-9E7C-1BFD992839F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0.0\",\"versionEndExcluding\":\"11.0\",\"matchCriteriaId\":\"63591E72-6038-4417-BA10-54180507AF0F\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/106996\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180924-0003/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180924-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-4xf8-qhpw-9g4c
Vulnerability from github
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
{ "affected": [], "aliases": [ "CVE-2018-3658" ], "database_specific": { "cwe_ids": [ "CWE-772" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-12T19:29:00Z", "severity": "MODERATE" }, "details": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", "id": "GHSA-4xf8-qhpw-9g4c", "modified": "2022-05-13T01:09:58Z", "published": "2022-05-13T01:09:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3658" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180924-0003" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106996" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
icsa-19-043-05
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." }, { "names": [ "Artem Zinenko" ], "organization": "Kaspersky", "summary": "for pointing out that SIPLUS should also be mentioned" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.", "title": "General Recommendations" }, { "category": "general", "text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-377318: Multiple vulnerabilities in Intel Active Management Technology (AMT)\n of SIMATIC IPCs - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-377318.html" }, { "category": "self", "summary": "ICS Advisory ICSA-19-043-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-043-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-043-05 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-043-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens Intel Active Management Technology of SIMATIC IPCs", "tracking": { "current_release_date": "2020-02-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-043-05", "initial_release_date": "2019-02-12T00:00:00.000000Z", "revision_history": [ { "date": "2019-02-12T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2020-02-10T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "SIPLUS devices now explicitly mentioned in the list of affected products" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV22.01.06", "product": { "name": "Siemens SIMATIC FieldPG M5: All versions \u003c V22.01.06", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC FieldPG M5" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.01.09", "product": { "name": "Siemens SIMATIC IPC427E (incl. SIPLUS variants): All versions \u003c V21.01.09", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SIMATIC IPC427E (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.01.09", "product": { "name": "Siemens SIMATIC IPC477E: All versions \u003c V21.01.09", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SIMATIC IPC477E" }, { "branches": [ { "category": "product_version_range", "name": "\u003cR1.30.0", "product": { "name": "Siemens SIMATIC IPC547E: All versions \u003c R1.30.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SIMATIC IPC547E" }, { "branches": [ { "category": "product_version_range", "name": "\u003cR1.23.0", "product": { "name": "Siemens SIMATIC IPC547G: All versions \u003c R1.23.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "SIMATIC IPC547G" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC627D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "SIMATIC IPC627D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.01.14", "product": { "name": "Siemens SIMATIC IPC647D: All versions \u003c V19.01.14", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "SIMATIC IPC647D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC677D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "SIMATIC IPC677D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC827D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "SIMATIC IPC827D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.01.14", "product": { "name": "Siemens SIMATIC IPC847D: All versions \u003c V19.01.14", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "SIMATIC IPC847D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV23.01.04", "product": { "name": "Siemens SIMATIC ITP1000: All versions \u003c V23.01.04", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "SIMATIC ITP1000" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3616", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3616" }, { "cve": "CVE-2018-3657", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3657" }, { "cve": "CVE-2018-3658", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3658" } ] }
ICSA-19-043-05
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." }, { "names": [ "Artem Zinenko" ], "organization": "Kaspersky", "summary": "for pointing out that SIPLUS should also be mentioned" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.", "title": "General Recommendations" }, { "category": "general", "text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-377318: Multiple vulnerabilities in Intel Active Management Technology (AMT)\n of SIMATIC IPCs - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-377318.html" }, { "category": "self", "summary": "ICS Advisory ICSA-19-043-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-043-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-043-05 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-043-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens Intel Active Management Technology of SIMATIC IPCs", "tracking": { "current_release_date": "2020-02-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-043-05", "initial_release_date": "2019-02-12T00:00:00.000000Z", "revision_history": [ { "date": "2019-02-12T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2020-02-10T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "SIPLUS devices now explicitly mentioned in the list of affected products" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV22.01.06", "product": { "name": "Siemens SIMATIC FieldPG M5: All versions \u003c V22.01.06", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC FieldPG M5" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.01.09", "product": { "name": "Siemens SIMATIC IPC427E (incl. SIPLUS variants): All versions \u003c V21.01.09", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SIMATIC IPC427E (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.01.09", "product": { "name": "Siemens SIMATIC IPC477E: All versions \u003c V21.01.09", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SIMATIC IPC477E" }, { "branches": [ { "category": "product_version_range", "name": "\u003cR1.30.0", "product": { "name": "Siemens SIMATIC IPC547E: All versions \u003c R1.30.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SIMATIC IPC547E" }, { "branches": [ { "category": "product_version_range", "name": "\u003cR1.23.0", "product": { "name": "Siemens SIMATIC IPC547G: All versions \u003c R1.23.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "SIMATIC IPC547G" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC627D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "SIMATIC IPC627D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.01.14", "product": { "name": "Siemens SIMATIC IPC647D: All versions \u003c V19.01.14", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "SIMATIC IPC647D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC677D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "SIMATIC IPC677D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.02.11", "product": { "name": "Siemens SIMATIC IPC827D: All versions \u003c V19.02.11", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "SIMATIC IPC827D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV19.01.14", "product": { "name": "Siemens SIMATIC IPC847D: All versions \u003c V19.01.14", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "SIMATIC IPC847D" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV23.01.04", "product": { "name": "Siemens SIMATIC ITP1000: All versions \u003c V23.01.04", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "SIMATIC ITP1000" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3616", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3616" }, { "cve": "CVE-2018-3657", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3657" }, { "cve": "CVE-2018-3658", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, "remediations": [ { "category": "mitigation", "details": "As a prerequisite for an attack, an attacker must be able to run malicious code on affected systems. Therefore, Siemens recommends determining if it is possible that untrusted code can be run on these systems, or if existing measures implemented by the operator reduce the likelihood of untrusted code being run.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] }, { "category": "vendor_fix", "details": "Update to V22.01.06 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V21.01.09 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to R1.30.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Update to R1.23.0 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V19.02.11 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0006", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "vendor_fix", "details": "Update to V19.01.14 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0007", "CSAFPID-0010" ] }, { "category": "vendor_fix", "details": "Update to V23.01.04 https://support.industry.siemens.com/cs/us/en/view/109747626", "product_ids": [ "CSAFPID-0011" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011" ] } ], "title": "CVE-2018-3658" } ] }
cnvd-2020-16622
Vulnerability from cnvd
Title: Intel CSME资源管理错误漏洞
Description:
Intel CSME是美国英特尔(Intel)公司的一款融合安全管理引擎。Intel AMT是其中的一个主动管理技术模块。
Intel CSME存在资源管理错误漏洞。攻击者可利用该漏洞造成拒绝服务(内存泄露)。
Severity: 中
Patch Name: Intel CSME资源管理错误漏洞的补丁
Patch Description:
Intel CSME是美国英特尔(Intel)公司的一款融合安全管理引擎。Intel AMT是其中的一个主动管理技术模块。
Intel CSME存在资源管理错误漏洞。攻击者可利用该漏洞造成拒绝服务(内存泄露)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
Reference: https://nvd.nist.gov/vuln/detail/CVE-2018-3658
Name | Intel CSME <12.0.5 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-3658" } }, "description": "Intel CSME\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u878d\u5408\u5b89\u5168\u7ba1\u7406\u5f15\u64ce\u3002Intel AMT\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3b\u52a8\u7ba1\u7406\u6280\u672f\u6a21\u5757\u3002\n\nIntel CSME\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u6cc4\u9732\uff09\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-16622", "openTime": "2020-03-10", "patchDescription": "Intel CSME\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u878d\u5408\u5b89\u5168\u7ba1\u7406\u5f15\u64ce\u3002Intel AMT\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3b\u52a8\u7ba1\u7406\u6280\u672f\u6a21\u5757\u3002\r\n\r\nIntel CSME\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u6cc4\u9732\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Intel CSME\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Intel CSME \u003c12.0.5" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-3658", "serverity": "\u4e2d", "submitTime": "2018-09-16", "title": "Intel CSME\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e" }
var-201809-1075
Vulnerability from variot
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1075", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.04" }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "active management technology", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.06" }, { "model": "simatic pc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.23.0" }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.30.0" }, { "model": "converged security management engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "manageability engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "11.0" }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "converged security management engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "11.0.0" }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "csme", "scope": "lt", "trust": 0.8, "vendor": "intel", "version": "12.0.5" }, { "model": "converged security management engine", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": null }, { "model": "simatic itp1000", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc827d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc677d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc647d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc627d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547g", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc477e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc427e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic fieldpg m5", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc827d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc677d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.11" }, { "model": "simatic ipc647d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc627d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc547g r1.23.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc547e r1.30.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc477e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic ipc427e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic fieldpg m5", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v22.01.06" } ], "sources": [ { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:csme_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 }, "cve": "CVE-2018-3658", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-3658", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-133689", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-3658", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-3658", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3658", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-3658", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-604", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133689", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-3658" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "BID", "id": "106996" }, { "db": "VULHUB", "id": "VHN-133689" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3658", "trust": 2.8 }, { "db": "ICS CERT", "id": "ICSA-19-043-05", "trust": 2.8 }, { "db": "BID", "id": "106996", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-377318", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-013145", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-604", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.0444", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133689", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "id": "VAR-201809-1075", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133689" } ], "trust": 0.71611305 }, "last_update_date": "2024-11-23T21:38:16.943000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00141", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "title": "Intel CSME Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84863" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106996" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03876en_us" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3658" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3658" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75474" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03876en_us" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-12T00:00:00", "db": "VULHUB", "id": "VHN-133689" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "date": "2018-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-604" }, { "date": "2018-09-12T19:29:02.967000", "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-133689" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-604" }, { "date": "2024-11-21T04:05:51.020000", "db": "NVD", "id": "CVE-2018-3658" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel CSME Firmware resource management vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 } }
fkie_cve-2018-3658
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegaci\u00f3n de servicio (DoS) parcial mediante acceso de red." } ], "id": "CVE-2018-3658", "lastModified": "2024-11-21T04:05:51.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.967", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-3658
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-3658", "description": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", "id": "GSD-2018-3658" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-3658" ], "details": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.", "id": "GSD-2018-3658", "modified": "2023-12-13T01:22:43.032982Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22.01.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.09", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.09", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "19.02.11", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "19.01.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "19.02.11", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "19.02.11", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "19.01.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "23.01.04", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3658" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-772" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "106996", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2023-08-17T17:43Z", "publishedDate": "2018-09-12T19:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.