Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6571 (GCVE-0-2019-6571)
Vulnerability from cvelistv5
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Siemens AG | SIEMENS LOGO!8 |
Version: 6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:23:22.055Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SIEMENS LOGO!8",
"vendor": "Siemens AG",
"versions": [
{
"status": "affected",
"version": "6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx"
}
]
},
{
"product": "SIEMENS LOGO!8",
"vendor": "Siemens AG",
"versions": [
{
"status": "affected",
"version": "6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-06-12T13:47:56",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-6571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SIEMENS LOGO!8",
"version": {
"version_data": [
{
"version_value": "6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx"
}
]
}
},
{
"product_name": "SIEMENS LOGO!8",
"version": {
"version_data": [
{
"version_value": "6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02"
}
]
}
}
]
},
"vendor_name": "Siemens AG"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2019-6571",
"datePublished": "2019-06-12T13:47:56",
"dateReserved": "2019-01-22T00:00:00",
"dateUpdated": "2024-08-04T20:23:22.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-6571\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2019-06-12T14:29:05.820\",\"lastModified\":\"2024-11-21T04:46:43.530\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad ha sido identificada en LOGO! 8 de SIEMENS (6ED1052-xyyxx-0BA8 FS:01 a FS:06 / versi\u00f3n de firmware V1.80.xx y V1.81.xx), SIEMENS LOGO! 8 (6ED1052-xyy08-0BA0 FS:01 / Versi\u00f3n de firmware \u003c V1.82.02). Un atacante con acceso de red al puerto 10005/tcp del dispositivo LOGO! podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio al enviar paquetes especialmente creados. La vulnerabilidad de la seguridad podr\u00eda ser explotada por un atacante no autenticado con acceso de red al servicio afectado. No es requerida la interacci\u00f3n del usuario para explotar esta vulnerabilidad de seguridad. La explotaci\u00f3n con \u00e9xito de la vulnerabilidad de seguridad compromete la disponibilidad del sistema de destino. En el momento de la publicaci\u00f3n de asesoramiento, no se conoc\u00eda la explotaci\u00f3n p\u00fablica de esta vulnerabilidad de seguridad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:logo\\\\!8_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.80.00\",\"versionEndIncluding\":\"1.81.00\",\"matchCriteriaId\":\"3263ABC4-B0EB-409B-96ED-1A751757999F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:logo\\\\!8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1769E8B8-0B40-4E85-B52C-52FA4907D610\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:logo\\\\!8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.82.00\",\"matchCriteriaId\":\"D867D890-22A1-461E-8BEE-9EEFF633633E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:logo\\\\!8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1769E8B8-0B40-4E85-B52C-52FA4907D610\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
cnvd-2019-17151
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.industry.siemens.com/cs/ww/en/view/109767410
| Name | Siemens LOGO!8 1.82.01 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-6571"
}
},
"description": "LOGO!8\u662f\u897f\u95e8\u5b50\u7b2c8\u4ee3\u667a\u80fd\u903b\u8f91\u63a7\u5236\u5668\uff0c\u662f\u897f\u95e8\u5b50PLC\u5bb6\u65cf\u91cc\u7684Nano PLC\uff0c\u5b83\u7b80\u5316\u4e86\u7f16\u7a0b\u7ec4\u6001\uff0c\u96c6\u6210\u7684\u9762\u677f\u53ef\u663e\u793a\u66f4\u591a\u7684\u5185\u5bb9\uff0c\u5e76\u53ef\u901a\u8fc7\u96c6\u6210\u7684\u4ee5\u592a\u7f51\u63a5\u53e3\u8f7b\u677e\u7ec4\u7f51\u9ad8\u6548\u4e92\u8054\u3002\n\nSiemens LOGO!8\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002",
"discovererName": "Thomas Meesters from cirosec GmbH and Ruhr University of Bochum, and Christian Siemers and Irakli Edjibia from Hochschule Augsburg",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109767410",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-17151",
"openTime": "2019-06-13",
"patchDescription": "LOGO!8\u662f\u897f\u95e8\u5b50\u7b2c8\u4ee3\u667a\u80fd\u903b\u8f91\u63a7\u5236\u5668\uff0c\u662f\u897f\u95e8\u5b50PLC\u5bb6\u65cf\u91cc\u7684Nano PLC\uff0c\u5b83\u7b80\u5316\u4e86\u7f16\u7a0b\u7ec4\u6001\uff0c\u96c6\u6210\u7684\u9762\u677f\u53ef\u663e\u793a\u66f4\u591a\u7684\u5185\u5bb9\uff0c\u5e76\u53ef\u901a\u8fc7\u96c6\u6210\u7684\u4ee5\u592a\u7f51\u63a5\u53e3\u8f7b\u677e\u7ec4\u7f51\u9ad8\u6548\u4e92\u8054\u3002\r\n\r\nSiemens LOGO!8\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens LOGO!8\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Siemens LOGO!8 1.82.01"
},
"referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf",
"serverity": "\u9ad8",
"submitTime": "2019-06-12",
"title": "Siemens LOGO!8\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
var-201906-0203
Vulnerability from variot
A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known. SIEMENS LOGO!8 Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. LOGO!8 is the 8th generation intelligent logic controller of Siemens. It is the NanoPLC in the Siemens PLC family. It simplifies the programming configuration, the integrated panel can display more content, and can be easily integrated efficiently through the integrated Ethernet interface. interconnected. A buffer error vulnerability exists in SiemensLOGO!8. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. Siemens LOGO!8 Devices are prone to multiple security vulnerabilities
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-0203",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "logo\\!8",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "1.81.00"
},
{
"model": "logo\\!8",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "1.80.00"
},
{
"model": "logo\\!8",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.82.00"
},
{
"model": "logo!8",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "1.82.01"
},
{
"model": "6ed1052-1cc08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-1fb08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-1hb08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-1md08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2cc08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2fb00-0ba8",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2fb08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2hb08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2md00-0ba8",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "6ed1052-2md08-0ba0",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "6ed1052 1fb00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "6ed1052 1fb00 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "6ed1052 2md00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "6ed1052 2md00 0ba8",
"version": "1.81.xx"
},
{
"model": "logo!8",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "1.82.02"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1cc08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2fb00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2fb00 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2hb00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2hb00 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1md00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1md00 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2cc01 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2cc01 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1cc01 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1cc01 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1hb00 0ba8",
"version": "1.80.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1hb00 0ba8",
"version": "1.81.xx"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1fb08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1hb08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 1md08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2cc08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2fb08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2hb08 0ba0",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "6ed1052 2md08 0ba0",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "BID",
"id": "108728"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-1cc08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-1fb08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-1hb08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-1md08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2cc08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2fb00-0ba8_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2fb08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2hb08-0ba0_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2md00-0ba8_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:6ed1052-2md08-0ba0_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "and Christian Siemers and Irakli Edjibia from Hochschule Augsburg reported these vulnerabilities to Siemens., and Christian Siemers and Irakli Edjibia from Hochschule Augsburg,Thomas Meesters from cirosec GmbH and Ruhr University of Bochum",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
}
],
"trust": 0.6
},
"cve": "CVE-2019-6571",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-6571",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-17151",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-158006",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-6571",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-6571",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-6571",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-6571",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-17151",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201906-521",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-158006",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "VULHUB",
"id": "VHN-158006"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known. SIEMENS LOGO!8 Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. LOGO!8 is the 8th generation intelligent logic controller of Siemens. It is the NanoPLC in the Siemens PLC family. It simplifies the programming configuration, the integrated panel can display more content, and can be easily integrated efficiently through the integrated Ethernet interface. interconnected. A buffer error vulnerability exists in SiemensLOGO!8. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. Siemens LOGO!8 Devices are prone to multiple security vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-6571"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "BID",
"id": "108728"
},
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "VULHUB",
"id": "VHN-158006"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-6571",
"trust": 3.6
},
{
"db": "SIEMENS",
"id": "SSA-774850",
"trust": 2.3
},
{
"db": "ICS CERT",
"id": "ICSA-19-162-03",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521",
"trust": 0.9
},
{
"db": "BID",
"id": "108728",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-17151",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571",
"trust": 0.8
},
{
"db": "IVD",
"id": "C64B4706-2FDE-4842-9DED-B92B3CDEF24B",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-158006",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "VULHUB",
"id": "VHN-158006"
},
{
"db": "BID",
"id": "108728"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"id": "VAR-201906-0203",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "VULHUB",
"id": "VHN-158006"
}
],
"trust": 1.7333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
}
]
},
"last_update_date": "2024-11-23T22:51:44.674000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-774850",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"title": "Patch for SiemensLOGO!8 Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/163433"
},
{
"title": "Siemens LOGO!8 Fixes for access control error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93755"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.1
},
{
"problemtype": "CWE-284",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-158006"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"trust": 0.9,
"url": "http://www.siemens.com/"
},
{
"trust": 0.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-162-03"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6571"
},
{
"trust": 0.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-162-03"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-6571"
},
{
"trust": 0.6,
"url": "https://www.securityfocus.com/bid/108728"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "VULHUB",
"id": "VHN-158006"
},
{
"db": "BID",
"id": "108728"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"db": "VULHUB",
"id": "VHN-158006"
},
{
"db": "BID",
"id": "108728"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-13T00:00:00",
"db": "IVD",
"id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
},
{
"date": "2019-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"date": "2019-06-12T00:00:00",
"db": "VULHUB",
"id": "VHN-158006"
},
{
"date": "2019-06-11T00:00:00",
"db": "BID",
"id": "108728"
},
{
"date": "2019-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"date": "2019-06-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"date": "2019-06-12T14:29:05.820000",
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-17151"
},
{
"date": "2020-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-158006"
},
{
"date": "2019-06-11T00:00:00",
"db": "BID",
"id": "108728"
},
{
"date": "2019-07-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005571"
},
{
"date": "2020-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201906-521"
},
{
"date": "2024-11-21T04:46:43.530000",
"db": "NVD",
"id": "CVE-2019-6571"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SIEMENS LOGO!8 Access control vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005571"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201906-521"
}
],
"trust": 0.6
}
}
ghsa-jm58-x52x-wjf4
Vulnerability from github
A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.
{
"affected": [],
"aliases": [
"CVE-2019-6571"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-06-12T14:29:00Z",
"severity": "HIGH"
},
"details": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"id": "GHSA-jm58-x52x-wjf4",
"modified": "2022-05-24T16:47:56Z",
"published": "2022-05-24T16:47:56Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6571"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
icsa-19-162-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"names": [
"Thomas Meesters"
],
"organization": "cirosec GmbH and Ruhr University of Bochum",
"summary": "coordinating disclosure of CVE-2019-6571"
},
{
"names": [
"Christian Siemers",
"Irakli Edjibia"
],
"organization": "Hochschule Augsburg",
"summary": "coordinating disclosure of CVE-2019-6584"
},
{
"names": [
"Artem Zinenko"
],
"organization": "Kaspersky",
"summary": "for pointing out that SIPLUS should also be mentioned"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-774850: Vulnerabilities in SIEMENS LOGO!8 devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-774850.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-162-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-162-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-162-03 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-162-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens LOGO!8 Devices",
"tracking": {
"current_release_date": "2020-02-10T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-162-03",
"initial_release_date": "2019-06-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-06-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-02-10T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "SIPLUS devices now explicitly mentioned in the list of affected products"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=6ED1052-xyyxx-0BA8_FS:01|\u003c6ED1052-xyyxx-0BA8_FS:06|V1.80.xx|V1.81.xx",
"product": {
"name": "Siemens SIEMENS LOGO!8 (incl. SIPLUS variants): 6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIEMENS LOGO!8 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6ED1052-xyyxx-0BA0_FS:01_firmware_V1.82.02",
"product": {
"name": "Siemens SIEMENS LOGO!8 (incl. SIPLUS variants): 6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIEMENS LOGO!8 (incl. SIPLUS variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-6571",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Protect network access to the device.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends to protect network access to the devices with appropriate mechanisms. It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.82.02 or higher https://support.industry.siemens.com/cs/ww/en/view/109767410",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2019-6571"
},
{
"cve": "CVE-2019-6584",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "summary",
"text": "An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Protect network access to the device.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends to protect network access to the devices with appropriate mechanisms. It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.82.02 or higher https://support.industry.siemens.com/cs/ww/en/view/109767410",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2019-6584"
}
]
}
ICSA-19-162-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"names": [
"Thomas Meesters"
],
"organization": "cirosec GmbH and Ruhr University of Bochum",
"summary": "coordinating disclosure of CVE-2019-6571"
},
{
"names": [
"Christian Siemers",
"Irakli Edjibia"
],
"organization": "Hochschule Augsburg",
"summary": "coordinating disclosure of CVE-2019-6584"
},
{
"names": [
"Artem Zinenko"
],
"organization": "Kaspersky",
"summary": "for pointing out that SIPLUS should also be mentioned"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-774850: Vulnerabilities in SIEMENS LOGO!8 devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-774850.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-162-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-162-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-162-03 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-162-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens LOGO!8 Devices",
"tracking": {
"current_release_date": "2020-02-10T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-162-03",
"initial_release_date": "2019-06-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-06-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-02-10T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "SIPLUS devices now explicitly mentioned in the list of affected products"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=6ED1052-xyyxx-0BA8_FS:01|\u003c6ED1052-xyyxx-0BA8_FS:06|V1.80.xx|V1.81.xx",
"product": {
"name": "Siemens SIEMENS LOGO!8 (incl. SIPLUS variants): 6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIEMENS LOGO!8 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6ED1052-xyyxx-0BA0_FS:01_firmware_V1.82.02",
"product": {
"name": "Siemens SIEMENS LOGO!8 (incl. SIPLUS variants): 6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIEMENS LOGO!8 (incl. SIPLUS variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-6571",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Protect network access to the device.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends to protect network access to the devices with appropriate mechanisms. It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.82.02 or higher https://support.industry.siemens.com/cs/ww/en/view/109767410",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2019-6571"
},
{
"cve": "CVE-2019-6584",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "summary",
"text": "An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Protect network access to the device.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends to protect network access to the devices with appropriate mechanisms. It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.82.02 or higher https://support.industry.siemens.com/cs/ww/en/view/109767410",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2019-6584"
}
]
}
CERTFR-2019-AVI-256
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC Ident MV420 | ||
| Siemens | N/A | SIEMENS LOGO!8 versions antérieures à V1.82.02 | ||
| Siemens | N/A | SCALANCE X-200IRT | ||
| Siemens | N/A | SCALANCE X-200 versions antérieures à V5.2.4 | ||
| Siemens | N/A | SCALANCE X-200RNA versions antérieures à V3.2.6 | ||
| Siemens | N/A | SIMATIC Ident MV440 | ||
| Siemens | N/A | SCALANCE X-300 | ||
| Siemens | N/A | Siveillance VMS 2018 R2 versions antérieures à V12.2a | ||
| Siemens | N/A | Siveillance VMS 2018 R1 versions antérieures à V12.1a | ||
| Siemens | N/A | Siveillance VMS 2019 R1 versions antérieures à V13.1a | ||
| Siemens | N/A | Siveillance VMS 2017 R2 versions antérieures à V11.2a | ||
| Siemens | N/A | SCALANCE X-414-3E | ||
| Siemens | N/A | Siveillance VMS 2018 R3 versions antérieures à V12.3a |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC Ident MV420",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIEMENS LOGO!8 versions ant\u00e9rieures \u00e0 V1.82.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200 versions ant\u00e9rieures \u00e0 V5.2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200RNA versions ant\u00e9rieures \u00e0 V3.2.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Ident MV440",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-300",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance VMS 2018 R2 versions ant\u00e9rieures \u00e0 V12.2a",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance VMS 2018 R1 versions ant\u00e9rieures \u00e0 V12.1a",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance VMS 2019 R1 versions ant\u00e9rieures \u00e0 V13.1a",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance VMS 2017 R2 versions ant\u00e9rieures \u00e0 V11.2a",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-414-3E",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siveillance VMS 2018 R3 versions ant\u00e9rieures \u00e0 V12.3a",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-6584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6584"
},
{
"name": "CVE-2019-6567",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6567"
},
{
"name": "CVE-2019-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6580"
},
{
"name": "CVE-2018-4833",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4833"
},
{
"name": "CVE-2019-10926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10926"
},
{
"name": "CVE-2019-6571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6571"
},
{
"name": "CVE-2019-10925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10925"
},
{
"name": "CVE-2019-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6581"
},
{
"name": "CVE-2019-6582",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6582"
}
],
"initial_release_date": "2019-06-11T00:00:00",
"last_revision_date": "2019-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-774850 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-816980 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-816980.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-646841 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-181018 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-212009 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-212009.pdf"
}
]
}
fkie_cve-2019-6571
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | logo\!8_firmware | * | |
| siemens | logo\!8 | - | |
| siemens | logo\!8_firmware | * | |
| siemens | logo\!8 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:logo\\!8_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3263ABC4-B0EB-409B-96ED-1A751757999F",
"versionEndIncluding": "1.81.00",
"versionStartIncluding": "1.80.00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:logo\\!8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1769E8B8-0B40-4E85-B52C-52FA4907D610",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:logo\\!8_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D867D890-22A1-461E-8BEE-9EEFF633633E",
"versionEndExcluding": "1.82.00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:logo\\!8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1769E8B8-0B40-4E85-B52C-52FA4907D610",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido identificada en LOGO! 8 de SIEMENS (6ED1052-xyyxx-0BA8 FS:01 a FS:06 / versi\u00f3n de firmware V1.80.xx y V1.81.xx), SIEMENS LOGO! 8 (6ED1052-xyy08-0BA0 FS:01 / Versi\u00f3n de firmware \u003c V1.82.02). Un atacante con acceso de red al puerto 10005/tcp del dispositivo LOGO! podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio al enviar paquetes especialmente creados. La vulnerabilidad de la seguridad podr\u00eda ser explotada por un atacante no autenticado con acceso de red al servicio afectado. No es requerida la interacci\u00f3n del usuario para explotar esta vulnerabilidad de seguridad. La explotaci\u00f3n con \u00e9xito de la vulnerabilidad de seguridad compromete la disponibilidad del sistema de destino. En el momento de la publicaci\u00f3n de asesoramiento, no se conoc\u00eda la explotaci\u00f3n p\u00fablica de esta vulnerabilidad de seguridad."
}
],
"id": "CVE-2019-6571",
"lastModified": "2024-11-21T04:46:43.530",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-06-12T14:29:05.820",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "productcert@siemens.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2019-6571
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2019-6571",
"description": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"id": "GSD-2019-6571"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-6571"
],
"details": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
"id": "GSD-2019-6571",
"modified": "2023-12-13T01:23:49.601594Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-6571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SIEMENS LOGO!8",
"version": {
"version_data": [
{
"version_value": "6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx"
}
]
}
},
{
"product_name": "SIEMENS LOGO!8",
"version": {
"version_data": [
{
"version_value": "6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02"
}
]
}
}
]
},
"vendor_name": "Siemens AG"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:logo\\!8_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.81.00",
"versionStartIncluding": "1.80.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:logo\\!8:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:logo\\!8_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.82.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:logo\\!8:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-6571"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-09-29T00:30Z",
"publishedDate": "2019-06-12T14:29Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.