Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-21658 (GCVE-0-2022-21658)
Vulnerability from cvelistv5 – Published: 2022-01-20 00:00 – Updated: 2025-04-22 18:32
VLAI?
EPSS
Title
Race condition in std::fs::remove_dir_all in rustlang
Summary
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
Severity ?
7.3 (High)
CWE
Assigner
References
15 references
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:46:39.244Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"tags": [
"x_transferred"
],
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"name": "FEDORA-2022-1bafa3fc91",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"name": "FEDORA-2022-2c73789458",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"name": "FEDORA-2022-1b76e3a192",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"name": "FEDORA-2022-06569a0a60",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213183"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213182"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213186"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213193"
},
{
"name": "GLSA-202210-09",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202210-09"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-21658",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-22T15:52:12.198921Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-22T18:32:53.619Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "rust",
"vendor": "rust-lang",
"versions": [
{
"status": "affected",
"version": "\u003c 1.58.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-363",
"description": "CWE-363: Race Condition Enabling Link Following",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-16T00:00:00.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"name": "FEDORA-2022-1bafa3fc91",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"name": "FEDORA-2022-2c73789458",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"name": "FEDORA-2022-1b76e3a192",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"name": "FEDORA-2022-06569a0a60",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"url": "https://support.apple.com/kb/HT213183"
},
{
"url": "https://support.apple.com/kb/HT213182"
},
{
"url": "https://support.apple.com/kb/HT213186"
},
{
"url": "https://support.apple.com/kb/HT213193"
},
{
"name": "GLSA-202210-09",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202210-09"
}
],
"source": {
"advisory": "GHSA-r9cc-f5pr-p3j2",
"discovery": "UNKNOWN"
},
"title": "Race condition in std::fs::remove_dir_all in rustlang"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-21658",
"datePublished": "2022-01-20T00:00:00.000Z",
"dateReserved": "2021-11-16T00:00:00.000Z",
"dateUpdated": "2025-04-22T18:32:53.619Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-21658",
"date": "2026-05-19",
"epss": "0.00906",
"percentile": "0.75994"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0.0\", \"versionEndIncluding\": \"1.58.0\", \"matchCriteriaId\": \"C1A1524F-CF05-4E2D-9A5B-B9A882DFF66D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.4\", \"matchCriteriaId\": \"7A28B309-0018-46A4-A533-F10428F689B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.4\", \"matchCriteriaId\": \"1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.3\", \"matchCriteriaId\": \"9422A022-F279-4596-BC97-3223611D73DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.4\", \"matchCriteriaId\": \"70A2E262-1C91-4030-A2D5-E089C271EA34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.5\", \"matchCriteriaId\": \"17C8B971-2F25-4961-B1AF-F4AAB1848990\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.\"}, {\"lang\": \"es\", \"value\": \"Rust es un lenguaje de programaci\\u00f3n multiparadigma de prop\\u00f3sito general dise\\u00f1ado para el rendimiento y la seguridad, especialmente la concurrencia segura. El Grupo de Trabajo de Respuesta de Seguridad de Rust fue notificado de que la funci\\u00f3n de la biblioteca est\\u00e1ndar \\\"std::fs::remove_dir_all\\\" es vulnerable a una condici\\u00f3n de carrera que permite el seguimiento de enlaces simb\\u00f3licos (CWE-363). Un atacante podr\\u00eda usar este problema de seguridad para enga\\u00f1ar a un programa con privilegios para que elimine archivos y directorios a los que el atacante no podr\\u00eda acceder o eliminar de otro modo. Rust versiones 1.0.0 hasta Rust versi\\u00f3n 1.58.0 est\\u00e1n afectados por esta vulnerabilidad, con la versi\\u00f3n 1.58.1 que contiene un parche. Tenga en cuenta que los siguientes objetivos de construcci\\u00f3n no presentan APIs usables para mitigar apropiadamente el ataque, y por lo tanto siguen siendo vulnerables incluso con una cadena de herramientas parcheada: macOS versiones anteriores a 10.10 (Yosemite) y REDOX. Recomendamos a todo el mundo que actualice a Rust versi\\u00f3n 1.58.1 tan pronto como sea posible, especialmente a las personas que desarrollan programas que esperan que sean ejecutados en contextos privilegiados (incluidos los demonios del sistema y los binarios setuid), ya que son los que presentan el mayor riesgo de estar afectados por esto. Tenga en cuenta que a\\u00f1adir comprobaciones en su c\\u00f3digo base antes de llamar a remove_dir_all no mitigar\\u00e1 la vulnerabilidad, ya que tambi\\u00e9n ser\\u00edan vulnerables a condiciones de carrera como el propio remove_dir_all. La mitigaci\\u00f3n existente funciona como es pretendido fuera de las condiciones de carrera\"}]",
"id": "CVE-2022-21658",
"lastModified": "2024-11-21T06:45:10.343",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 4.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 6.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:N/I:P/A:P\", \"baseScore\": 3.3, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-01-20T18:15:07.703",
"references": "[{\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202210-09\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213182\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213186\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213193\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202210-09\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213182\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213186\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-363\"}, {\"lang\": \"en\", \"value\": \"CWE-367\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-367\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-21658\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-20T18:15:07.703\",\"lastModified\":\"2024-11-21T06:45:10.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.\"},{\"lang\":\"es\",\"value\":\"Rust es un lenguaje de programaci\u00f3n multiparadigma de prop\u00f3sito general dise\u00f1ado para el rendimiento y la seguridad, especialmente la concurrencia segura. El Grupo de Trabajo de Respuesta de Seguridad de Rust fue notificado de que la funci\u00f3n de la biblioteca est\u00e1ndar \\\"std::fs::remove_dir_all\\\" es vulnerable a una condici\u00f3n de carrera que permite el seguimiento de enlaces simb\u00f3licos (CWE-363). Un atacante podr\u00eda usar este problema de seguridad para enga\u00f1ar a un programa con privilegios para que elimine archivos y directorios a los que el atacante no podr\u00eda acceder o eliminar de otro modo. Rust versiones 1.0.0 hasta Rust versi\u00f3n 1.58.0 est\u00e1n afectados por esta vulnerabilidad, con la versi\u00f3n 1.58.1 que contiene un parche. Tenga en cuenta que los siguientes objetivos de construcci\u00f3n no presentan APIs usables para mitigar apropiadamente el ataque, y por lo tanto siguen siendo vulnerables incluso con una cadena de herramientas parcheada: macOS versiones anteriores a 10.10 (Yosemite) y REDOX. Recomendamos a todo el mundo que actualice a Rust versi\u00f3n 1.58.1 tan pronto como sea posible, especialmente a las personas que desarrollan programas que esperan que sean ejecutados en contextos privilegiados (incluidos los demonios del sistema y los binarios setuid), ya que son los que presentan el mayor riesgo de estar afectados por esto. Tenga en cuenta que a\u00f1adir comprobaciones en su c\u00f3digo base antes de llamar a remove_dir_all no mitigar\u00e1 la vulnerabilidad, ya que tambi\u00e9n ser\u00edan vulnerables a condiciones de carrera como el propio remove_dir_all. La mitigaci\u00f3n existente funciona como es pretendido fuera de las condiciones de carrera\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-363\"},{\"lang\":\"en\",\"value\":\"CWE-367\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.58.0\",\"matchCriteriaId\":\"C1A1524F-CF05-4E2D-9A5B-B9A882DFF66D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"7A28B309-0018-46A4-A533-F10428F689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.3\",\"matchCriteriaId\":\"9422A022-F279-4596-BC97-3223611D73DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"70A2E262-1C91-4030-A2D5-E089C271EA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.5\",\"matchCriteriaId\":\"17C8B971-2F25-4961-B1AF-F4AAB1848990\"}]}]}],\"references\":[{\"url\":\"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.gentoo.org/glsa/202210-09\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213182\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213186\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213193\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202210-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Race condition in std::fs::remove_dir_all in rustlang\", \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2022-10-16T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.\"}], \"affected\": [{\"vendor\": \"rust-lang\", \"product\": \"rust\", \"versions\": [{\"version\": \"\u003c 1.58.1\", \"status\": \"affected\"}]}], \"references\": [{\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\"}, {\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\"}, {\"name\": \"FEDORA-2022-1bafa3fc91\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\"}, {\"name\": \"FEDORA-2022-2c73789458\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\"}, {\"name\": \"FEDORA-2022-1b76e3a192\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\"}, {\"name\": \"FEDORA-2022-06569a0a60\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\"}, {\"url\": \"https://support.apple.com/kb/HT213183\"}, {\"url\": \"https://support.apple.com/kb/HT213182\"}, {\"url\": \"https://support.apple.com/kb/HT213186\"}, {\"url\": \"https://support.apple.com/kb/HT213193\"}, {\"name\": \"GLSA-202210-09\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://security.gentoo.org/glsa/202210-09\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\"}}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-363: Race Condition Enabling Link Following\", \"cweId\": \"CWE-363\"}]}, {\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition\", \"cweId\": \"CWE-367\"}]}], \"source\": {\"advisory\": \"GHSA-r9cc-f5pr-p3j2\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T02:46:39.244Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\", \"tags\": [\"x_transferred\"]}, {\"name\": \"FEDORA-2022-1bafa3fc91\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\"}, {\"name\": \"FEDORA-2022-2c73789458\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\"}, {\"name\": \"FEDORA-2022-1b76e3a192\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\"}, {\"name\": \"FEDORA-2022-06569a0a60\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\"}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213182\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213186\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213193\", \"tags\": [\"x_transferred\"]}, {\"name\": \"GLSA-202210-09\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://security.gentoo.org/glsa/202210-09\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-21658\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T15:52:12.198921Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-22T15:52:13.659Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-21658\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"assignerShortName\": \"GitHub_M\", \"dateUpdated\": \"2025-04-22T18:32:53.619Z\", \"dateReserved\": \"2021-11-16T00:00:00.000Z\", \"datePublished\": \"2022-01-20T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
alsa-2022:1894
Vulnerability from osv_almalinux
Published
2022-05-10 08:06
Modified
2022-05-10 08:06
Summary
Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update
Details
Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries.
The following packages have been upgraded to a later upstream version: rust (1.58.0). (BZ#2002883)
Security Fix(es):
- rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed (CVE-2022-21658)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
References
| URL | Type | |
|---|---|---|
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cargo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cargo-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "clippy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rls"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-analysis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-debugger-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-gdb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-lldb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-src"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-std-static"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-std-static-wasm32-unknown-unknown"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-std-static-wasm32-wasi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rust-toolset"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rustfmt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.58.1-1.module_el8.6.0+2748+176088b3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. \n\nThe following packages have been upgraded to a later upstream version: rust (1.58.0). (BZ#2002883)\n\nSecurity Fix(es):\n\n* rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed (CVE-2022-21658)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2022:1894",
"modified": "2022-05-10T08:06:43Z",
"published": "2022-05-10T08:06:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1894.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-21658"
}
],
"related": [
"CVE-2022-21658"
],
"summary": "Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update"
}
BDU:2022-05167
Vulnerability from fstec - Published: 23.01.2022
VLAI Severity ?
Title
Уязвимость функции std::fs::remove_dir_all языка программирования Rust, позволяющая нарушителю удалить произвольные системные файлы и каталоги
Description
Уязвимость функции std::fs::remove_dir_all языка программирования Rust связана с ошибками синхронизации при использовании общего ресурса («Ситуация гонки»). Эксплуатация уязвимости может позволить нарушителю удалить произвольные системные файлы и каталоги
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения, Fedora Project, ООО «Ред Софт», Apple Inc., The Rust Foundation, АО "НППКТ"
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, Fedora, РЕД ОС (запись в едином реестре российских программ №3751), MacOS, Rust, iOS, iPadOS, tvOS, watchOS, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 34 (Fedora), 11 (Debian GNU/Linux), 35 (Fedora), 7.3 (РЕД ОС), 9 (Red Hat Enterprise Linux), Monterey до 12.3 (MacOS), от 1.0.0 до 1.58.0 включительно (Rust), до 15.4 (iOS), до 15.4 (iPadOS), до 15.4 (tvOS), до 8.5 (watchOS), до 2.6 (ОСОН ОСнова Оnyx), до 2.9 (ОСОН ОСнова Оnyx)
Possible Mitigations
Использование рекомендаций:
Для Rust:
https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-21658
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
Для программных продуктов Apple Inc.:
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213186
https://support.apple.com/kb/HT213193
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения rustc-mozilla до версии 1.59.0+dfsg1-1~deb10u3.osnova1
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения rustc до версии 1.70.0+dfsg1-1osnova1
Reference
https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/
https://security-tracker.debian.org/tracker/CVE-2022-21658
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213186
https://support.apple.com/kb/HT213193
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.6/
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.9/
CWE
CWE-362
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Fedora Project, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Apple Inc., The Rust Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 34 (Fedora), 11 (Debian GNU/Linux), 35 (Fedora), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 9 (Red Hat Enterprise Linux), Monterey \u0434\u043e 12.3 (MacOS), \u043e\u0442 1.0.0 \u0434\u043e 1.58.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Rust), \u0434\u043e 15.4 (iOS), \u0434\u043e 15.4 (iPadOS), \u0434\u043e 15.4 (tvOS), \u0434\u043e 8.5 (watchOS), \u0434\u043e 2.6 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 2.9 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Rust:\nhttps://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\nhttps://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\nhttps://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421:\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-21658\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Apple Inc.:\nhttps://support.apple.com/kb/HT213182\nhttps://support.apple.com/kb/HT213183\nhttps://support.apple.com/kb/HT213186\nhttps://support.apple.com/kb/HT213193\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f rustc-mozilla \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1.59.0+dfsg1-1~deb10u3.osnova1\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f rustc \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1.70.0+dfsg1-1osnova1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "23.01.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "09.01.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.08.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05167",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-21658",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Fedora, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), MacOS, Rust, iOS, iPadOS, tvOS, watchOS, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 34 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , Fedora Project Fedora 35 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Red Hat Inc. Red Hat Enterprise Linux 9 , Apple Inc. MacOS Monterey \u0434\u043e 12.3 , Apple Inc. iOS \u0434\u043e 15.4 , Apple Inc. iPadOS \u0434\u043e 15.4 , Apple Inc. tvOS \u0434\u043e 15.4 , Apple Inc. watchOS \u0434\u043e 8.5 , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.6 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.9 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 std::fs::remove_dir_all \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Rust, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0438 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 std::fs::remove_dir_all \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Rust \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0438 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\nhttps://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\nhttps://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-v-standartnoy-biblioteke-yazyka-rust-cve-2022-21658/\nhttps://security-tracker.debian.org/tracker/CVE-2022-21658\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\nhttps://support.apple.com/kb/HT213182\nhttps://support.apple.com/kb/HT213183\nhttps://support.apple.com/kb/HT213186\nhttps://support.apple.com/kb/HT213193\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.6/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.9/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
FKIE_CVE-2022-21658
Vulnerability from fkie_nvd - Published: 2022-01-20 18:15 - Updated: 2024-11-21 06:45
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A1524F-CF05-4E2D-9A5B-B9A882DFF66D",
"versionEndIncluding": "1.58.0",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A28B309-0018-46A4-A533-F10428F689B4",
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767",
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9422A022-F279-4596-BC97-3223611D73DC",
"versionEndExcluding": "12.3",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70A2E262-1C91-4030-A2D5-E089C271EA34",
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17C8B971-2F25-4961-B1AF-F4AAB1848990",
"versionEndExcluding": "8.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions."
},
{
"lang": "es",
"value": "Rust es un lenguaje de programaci\u00f3n multiparadigma de prop\u00f3sito general dise\u00f1ado para el rendimiento y la seguridad, especialmente la concurrencia segura. El Grupo de Trabajo de Respuesta de Seguridad de Rust fue notificado de que la funci\u00f3n de la biblioteca est\u00e1ndar \"std::fs::remove_dir_all\" es vulnerable a una condici\u00f3n de carrera que permite el seguimiento de enlaces simb\u00f3licos (CWE-363). Un atacante podr\u00eda usar este problema de seguridad para enga\u00f1ar a un programa con privilegios para que elimine archivos y directorios a los que el atacante no podr\u00eda acceder o eliminar de otro modo. Rust versiones 1.0.0 hasta Rust versi\u00f3n 1.58.0 est\u00e1n afectados por esta vulnerabilidad, con la versi\u00f3n 1.58.1 que contiene un parche. Tenga en cuenta que los siguientes objetivos de construcci\u00f3n no presentan APIs usables para mitigar apropiadamente el ataque, y por lo tanto siguen siendo vulnerables incluso con una cadena de herramientas parcheada: macOS versiones anteriores a 10.10 (Yosemite) y REDOX. Recomendamos a todo el mundo que actualice a Rust versi\u00f3n 1.58.1 tan pronto como sea posible, especialmente a las personas que desarrollan programas que esperan que sean ejecutados en contextos privilegiados (incluidos los demonios del sistema y los binarios setuid), ya que son los que presentan el mayor riesgo de estar afectados por esto. Tenga en cuenta que a\u00f1adir comprobaciones en su c\u00f3digo base antes de llamar a remove_dir_all no mitigar\u00e1 la vulnerabilidad, ya que tambi\u00e9n ser\u00edan vulnerables a condiciones de carrera como el propio remove_dir_all. La mitigaci\u00f3n existente funciona como es pretendido fuera de las condiciones de carrera"
}
],
"id": "CVE-2022-21658",
"lastModified": "2024-11-21T06:45:10.343",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-20T18:15:07.703",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-09"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213182"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213183"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213186"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-09"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213182"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213193"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-363"
},
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2022-21658
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-21658",
"description": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.",
"id": "GSD-2022-21658",
"references": [
"https://www.suse.com/security/cve/CVE-2022-21658.html",
"https://advisories.mageia.org/CVE-2022-21658.html",
"https://linux.oracle.com/cve/CVE-2022-21658.html",
"https://access.redhat.com/errata/RHSA-2022:1894"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-21658"
],
"details": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.",
"id": "GSD-2022-21658",
"modified": "2023-12-13T01:19:14.127854Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21658",
"STATE": "PUBLIC",
"TITLE": "Race condition in std::fs::remove_dir_all in rustlang"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rust",
"version": {
"version_data": [
{
"version_value": "\u003c 1.58.1"
}
]
}
}
]
},
"vendor_name": "rust-lang"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-363: Race Condition Enabling Link Following"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2",
"refsource": "CONFIRM",
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110",
"refsource": "MISC",
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946",
"refsource": "MISC",
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf",
"refsource": "MISC",
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714",
"refsource": "MISC",
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"name": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html",
"refsource": "MISC",
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"name": "FEDORA-2022-1bafa3fc91",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"name": "FEDORA-2022-2c73789458",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"name": "FEDORA-2022-1b76e3a192",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"name": "FEDORA-2022-06569a0a60",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"name": "https://support.apple.com/kb/HT213183",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213183"
},
{
"name": "https://support.apple.com/kb/HT213182",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213182"
},
{
"name": "https://support.apple.com/kb/HT213186",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213186"
},
{
"name": "https://support.apple.com/kb/HT213193",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213193"
},
{
"name": "GLSA-202210-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202210-09"
}
]
},
"source": {
"advisory": "GHSA-r9cc-f5pr-p3j2",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.58.0",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "12.3",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-21658"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-363"
},
{
"lang": "en",
"value": "CWE-367"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/rust-lang/rust/pull/93110",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf"
},
{
"name": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"
},
{
"name": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714"
},
{
"name": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2"
},
{
"name": "FEDORA-2022-1bafa3fc91",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/"
},
{
"name": "FEDORA-2022-2c73789458",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/"
},
{
"name": "FEDORA-2022-1b76e3a192",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/"
},
{
"name": "FEDORA-2022-06569a0a60",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/"
},
{
"name": "https://support.apple.com/kb/HT213183",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213183"
},
{
"name": "https://support.apple.com/kb/HT213182",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213182"
},
{
"name": "https://support.apple.com/kb/HT213193",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213193"
},
{
"name": "https://support.apple.com/kb/HT213186",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213186"
},
{
"name": "GLSA-202210-09",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202210-09"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
},
"lastModifiedDate": "2022-10-19T13:22Z",
"publishedDate": "2022-01-20T18:15Z"
}
}
}
ICSA-25-100-02
Vulnerability from csaf_cisa - Published: 2025-04-08 00:00 - Updated: 2025-05-06 06:00Summary
Siemens SIDIS Prime
Notes
Summary: SIDIS Prime before V4.0.700 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, Boost C++ Libraries and several Microsoft components as described below.
Siemens has released a new version of SIDIS Prime and recommends to update to the latest version.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice: All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer: This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors: Chemical, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems
Countries/areas deployed: Worldwide
Company headquarters location: Germany
Recommended Practices: CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices: Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices: Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
7.3 (High)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.3 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.3 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
7.8 (High)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
7.5 (High)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.3 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.5 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
8.7 (High)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
4.7 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.5 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
5.9 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
4.3 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
6.8 (Medium)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
7.5 (High)
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIDIS Prime
Siemens / SIDIS Prime
|
<V4.0.700 |
Vendor Fix
|
References
10 references
Acknowledgments
Siemens
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIDIS Prime before V4.0.700 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, Boost C++ Libraries and several Microsoft components as described below.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Chemical, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-277137.json"
},
{
"category": "self",
"summary": "SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-277137.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-100-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-100-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-100-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIDIS Prime",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"date": "2025-04-10T17:11:44.518649Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-100-02",
"initial_release_date": "2025-04-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.0.700",
"product": {
"name": "SIDIS Prime",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIDIS Prime"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"cwe": {
"id": "CWE-363",
"name": "Race Condition Enabling Link Following"
},
"notes": [
{
"category": "summary",
"text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21658"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-684",
"name": "Incorrect Provision of Specified Functionality"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2024-0056",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0056"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-21319",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Microsoft Identity Denial of service vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-21319"
},
{
"cve": "CVE-2024-30105",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": ".NET and Visual Studio Denial of Service Vulnerability",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V4.0.700 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-30105"
}
]
}
MSRC_CVE-2022-21658
Vulnerability from csaf_microsoft - Published: 2022-01-02 00:00 - Updated: 2022-02-01 00:00Summary
Race condition in std::fs::remove_dir_all in rustlang
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
6.3 (Medium)
Affected products
Fixed
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17941-16820 | — | ||
| Unresolved product id: 18801-17086 | — |
References
4 references
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2022/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2022/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-21658 Race condition in std::fs::remove_dir_all in rustlang - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-21658.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Race condition in std::fs::remove_dir_all in rustlang",
"tracking": {
"current_release_date": "2022-02-01T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:13:23.019Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-21658",
"initial_release_date": "2022-01-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-02-01T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 rust 1.59.0-1",
"product": {
"name": "\u003ccm1 rust 1.59.0-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 rust 1.59.0-1",
"product": {
"name": "cm1 rust 1.59.0-1",
"product_id": "17941"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 rust 1.59.0-1",
"product": {
"name": "\u003ccbl2 rust 1.59.0-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 rust 1.59.0-1",
"product": {
"name": "cbl2 rust 1.59.0-1",
"product_id": "18801"
}
}
],
"category": "product_name",
"name": "rust"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 rust 1.59.0-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 rust 1.59.0-1 as a component of CBL Mariner 1.0",
"product_id": "17941-16820"
},
"product_reference": "17941",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 rust 1.59.0-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rust 1.59.0-1 as a component of CBL Mariner 2.0",
"product_id": "18801-17086"
},
"product_reference": "18801",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17941-16820",
"18801-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-21658 Race condition in std::fs::remove_dir_all in rustlang - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-21658.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-02-01T00:00:00.000Z",
"details": "1.59.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "Race condition in std::fs::remove_dir_all in rustlang"
}
]
}
NCSC-2025-0106
Vulnerability from csaf_ncscnl - Published: 2025-04-08 13:57 - Updated: 2025-04-08 13:57Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.
Interpretaties: De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (root/admin rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Spoofing
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen: Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Dreigingsinformatie:
Kans: medium
Schade: high
CWE-287: Improper Authentication
CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation
CWE-606: Unchecked Input for Loop Condition
CWE-1395: Dependency on Vulnerable Third-Party Component
CWE-363: Race Condition Enabling Link Following
CWE-420: Unprotected Alternate Channel
CWE-684: Incorrect Provision of Specified Functionality
CWE-834: Excessive Iteration
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-440: Expected Behavior Violation
CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE-319: Cleartext Transmission of Sensitive Information
CWE-354: Improper Validation of Integrity Check Value
CWE-325: Missing Cryptographic Step
CWE-404: Improper Resource Shutdown or Release
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333: Inefficient Regular Expression Complexity
CWE-416: Use After Free
CWE-476: NULL Pointer Dereference
CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE-400: Uncontrolled Resource Consumption
CWE-787: Out-of-bounds Write
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-122: Heap-based Buffer Overflow
CWE-20: Improper Input Validation
CWE-1390: Weak Authentication
CWE-204: Observable Response Discrepancy
CWE-15: External Control of System or Configuration Setting
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-653: Improper Isolation or Compartmentalization
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-620: Unverified Password Change
CWE-798: Use of Hard-coded Credentials
CWE-269: Improper Privilege Management
CWE-295: Improper Certificate Validation
7.3 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.5 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-754
- Improper Check for Unusual or Exceptional Conditions
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.3 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.7 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-416
- Use After Free
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.5 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.1 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-787
- Out-of-bounds Write
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-400
- Uncontrolled Resource Consumption
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-400
- Uncontrolled Resource Consumption
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-400
- Uncontrolled Resource Consumption
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.1 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.1 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.1 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
7.3 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.6 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.6 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
10.0 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
6.5 (Medium)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
6.5 (Medium)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-787
- Out-of-bounds Write
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.8 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
5.3 (Medium)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
4.8 (Medium)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
9.8 (Critical)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
8.8 (High)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
CWE-269
- Improper Privilege Management
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
6.7 (Medium)
Affected products
Known affected
90 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/<v1.21.1-1-a
Siemens / Industrial Edge Own Device (IEOD)
|
vers:unknown/<v1.21.1-1-a | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - x86-64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - x86-64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - x86-64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<v1.21.1-1
Siemens / Industrial Edge Device Kit - arm64 V1.21
|
vers:unknown/<v1.21.1-1 | ||
|
vers:unknown/<v1.20.2-1
Siemens / Industrial Edge Device Kit - arm64 V1.20
|
vers:unknown/<v1.20.2-1 | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.19
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Industrial Edge Device Kit - arm64 V1.17
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SENTRON 7KT PAC1260 Data Manager
|
vers:unknown/<* | ||
|
vers:unknown/4.0
Siemens / License Server
|
vers:unknown/4.0 | ||
|
vers:unknown/4.1
Siemens / License Server
|
vers:unknown/4.1 | ||
|
vers:unknown/4.2
Siemens / License Server
|
vers:unknown/4.2 | ||
|
vers:unknown/<v4.3
Siemens / Siemens License Server (SLS)
|
vers:unknown/<v4.3 | ||
|
vers:siemens/224.0 update 12
Siemens / Siemens / Solid Edge
|
vers:siemens/224.0 update 12 | ||
|
vers:siemens/225.0 update 3
Siemens / Siemens / Solid Edge
|
vers:siemens/225.0 update 3 | ||
|
vers:unknown/<v224.0update12
Siemens / Solid Edge SE2024
|
vers:unknown/<v224.0update12 | ||
|
vers:unknown/<v225.0update3
Siemens / Solid Edge SE2025
|
vers:unknown/<v225.0update3 | ||
|
vers:siemens/v224.0 update 12
Siemens / Siemens / Solid_Edge_Se2024
|
vers:siemens/v224.0 update 12 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU DIQ
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<v2.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0 | ||
|
vers:unknown/<v2.0.0
Siemens / SIMATIC CFU PA
|
vers:unknown/<v2.0.0 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200AL IM 157-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN FO
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1510SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP CPU 1512SP-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 MF HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN BA
|
vers:unknown/<* | ||
|
vers:unknown/<v1.3
Siemens / SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)
|
vers:unknown/<v1.3 | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN HS
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATD430W
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530G COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIDOOR ATE530S COATED
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMOCODE pro V PROFINET
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SINUMERIK 840D sl
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP231
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP241
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP251
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP521 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIWAREX WP522 ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)
|
vers:unknown/<* | ||
|
vers:unknown/<v8.3
Siemens / SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)
|
vers:unknown/<v8.3 | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200M IM 153-4 PN IO ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8 PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM 151-8F PN/DP CPU
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200S IM151-3 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP CPU 1512SP F-1 PN
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN HF TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / SIPLUS HCS4200 CIM4210
|
vers:unknown/<* | ||
|
vers:unknown/10.16.0
Siemens / Mendix Runtime
|
vers:unknown/10.16.0 | ||
|
vers:unknown/<v10.21.0
Siemens / Mendix Runtime V10
|
vers:unknown/<v10.21.0 | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.12
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.18
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V10.6
|
vers:unknown/<* | ||
|
vers:unknown/<*
Siemens / Mendix Runtime V8
|
vers:unknown/<* | ||
|
vers:unknown/<v9.24.34
Siemens / Mendix Runtime V9
|
vers:unknown/<v9.24.34 | ||
|
vers:siemens/2.0 sp1
Siemens / Siemens / SINEC Network Management System
|
vers:siemens/2.0 sp1 | ||
|
vers:unknown/none
Siemens / Siemens / Siemens Simatic S7-1500 Tm Mfp
|
vers:unknown/none | ||
|
vers:unknown/>=3|<312
Siemens / Siemens / Siemens Telecontrol Server Basic
|
vers:unknown/>=3|<312 |
References
44 references
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Race Condition Enabling Link Following",
"title": "CWE-363"
},
{
"category": "general",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Unverified Password Change",
"title": "CWE-620"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-187636.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-277137.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-525431.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-634640.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672923.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-725549.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-819629.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874353.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-817234.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-04-08T13:57:11.959816Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0106",
"initial_release_date": "2025-04-08T13:57:11.959816Z",
"revision_history": [
{
"date": "2025-04-08T13:57:11.959816Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1-a",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1-a",
"product_id": "CSAFPID-2631845"
}
}
],
"category": "product_name",
"name": "Industrial Edge Own Device (IEOD)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1",
"product_id": "CSAFPID-2631844"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.20.2-1",
"product": {
"name": "vers:unknown/\u003cv1.20.2-1",
"product_id": "CSAFPID-2631843"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631842"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631841"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631840"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1",
"product_id": "CSAFPID-2631839"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.20.2-1",
"product": {
"name": "vers:unknown/\u003cv1.20.2-1",
"product_id": "CSAFPID-2631838"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631837"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631836"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631835"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631900"
}
}
],
"category": "product_name",
"name": "SENTRON 7KT PAC1260 Data Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4.0",
"product": {
"name": "vers:unknown/4.0",
"product_id": "CSAFPID-2632341"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.1",
"product": {
"name": "vers:unknown/4.1",
"product_id": "CSAFPID-2632342"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.2",
"product": {
"name": "vers:unknown/4.2",
"product_id": "CSAFPID-2632343"
}
}
],
"category": "product_name",
"name": "License Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.3",
"product": {
"name": "vers:unknown/\u003cv4.3",
"product_id": "CSAFPID-2631790"
}
}
],
"category": "product_name",
"name": "Siemens License Server (SLS)"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/224.0 update 12",
"product": {
"name": "vers:siemens/224.0 update 12",
"product_id": "CSAFPID-2632460"
}
},
{
"category": "product_version_range",
"name": "vers:siemens/225.0 update 3",
"product": {
"name": "vers:siemens/225.0 update 3",
"product_id": "CSAFPID-2632459"
}
}
],
"category": "product_name",
"name": "Solid Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/v224.0 update 12",
"product": {
"name": "vers:siemens/v224.0 update 12",
"product_id": "CSAFPID-2632083"
}
}
],
"category": "product_name",
"name": "Solid_Edge_Se2024"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/2.0 sp1",
"product": {
"name": "vers:siemens/2.0 sp1",
"product_id": "CSAFPID-1211926"
}
}
],
"category": "product_name",
"name": "SINEC Network Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619361"
}
}
],
"category": "product_name",
"name": "Siemens Simatic S7-1500 Tm Mfp"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=3|\u003c312",
"product": {
"name": "vers:unknown/\u003e=3|\u003c312",
"product_id": "CSAFPID-1209122"
}
}
],
"category": "product_name",
"name": "Siemens Telecontrol Server Basic"
}
],
"category": "product_family",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv224.0update12",
"product": {
"name": "vers:unknown/\u003cv224.0update12",
"product_id": "CSAFPID-2631854"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2024"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv225.0update3",
"product": {
"name": "vers:unknown/\u003cv225.0update3",
"product_id": "CSAFPID-2631855"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0.0",
"product": {
"name": "vers:unknown/\u003cv2.0.0",
"product_id": "CSAFPID-1296722"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0",
"product": {
"name": "vers:unknown/\u003cv2.0",
"product_id": "CSAFPID-2631923"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0.0",
"product": {
"name": "vers:unknown/\u003cv2.0.0",
"product_id": "CSAFPID-1296723"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631924"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200AL IM 157-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631925"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200M IM 153-4 PN IO HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631926"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200M IM 153-4 PN IO ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631927"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631928"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631929"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631932"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN FO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631933"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631934"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN HS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631935"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765658"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-8 PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765659"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-8F PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631856"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1510SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631858"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1510SP-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631860"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1512SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631862"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1512SP-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765660"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 MF HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631936"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.3",
"product": {
"name": "vers:unknown/\u003cv1.3",
"product_id": "CSAFPID-2631937"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631938"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631939"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631940"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631920"
}
}
],
"category": "product_name",
"name": "SIDOOR ATD430W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631921"
}
}
],
"category": "product_name",
"name": "SIDOOR ATE530G COATED"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631922"
}
}
],
"category": "product_name",
"name": "SIDOOR ATE530S COATED"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631967"
}
}
],
"category": "product_name",
"name": "SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631968"
}
}
],
"category": "product_name",
"name": "SIMOCODE pro V PROFINET"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631969"
}
}
],
"category": "product_name",
"name": "SINUMERIK 840D sl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632004"
}
}
],
"category": "product_name",
"name": "SIWAREX WP231"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632005"
}
}
],
"category": "product_name",
"name": "SIWAREX WP241"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632006"
}
}
],
"category": "product_name",
"name": "SIWAREX WP251"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632007"
}
}
],
"category": "product_name",
"name": "SIWAREX WP521 ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632008"
}
}
],
"category": "product_name",
"name": "SIWAREX WP522 ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631966"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765690"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765691"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.3",
"product": {
"name": "vers:unknown/\u003cv8.3",
"product_id": "CSAFPID-2459039"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631970"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200M IM 153-4 PN IO HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631971"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200M IM 153-4 PN IO ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631972"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631973"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631974"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631975"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765700"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM 151-8 PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765701"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM 151-8F PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631976"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM151-3 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631977"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM151-3 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296980"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CPU 1512SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631978"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631979"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631980"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631981"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631982"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631983"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631984"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631985"
}
}
],
"category": "product_name",
"name": "SIPLUS HCS4200 CIM4210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/10.16.0",
"product": {
"name": "vers:unknown/10.16.0",
"product_id": "CSAFPID-2632402"
}
}
],
"category": "product_name",
"name": "Mendix Runtime"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.21.0",
"product": {
"name": "vers:unknown/\u003cv10.21.0",
"product_id": "CSAFPID-2631802"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631803"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.12"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631804"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631805"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296837"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V8"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv9.24.34",
"product": {
"name": "vers:unknown/\u003cv9.24.34",
"product_id": "CSAFPID-2631806"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V9"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "other",
"text": "Race Condition Enabling Link Following",
"title": "CWE-363"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-21658",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-21658.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2022-21658"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2024-0056",
"cwe": {
"id": "CWE-420",
"name": "Unprotected Alternate Channel"
},
"notes": [
{
"category": "other",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-0056"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-21319",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21319.json"
}
],
"title": "CVE-2024-21319"
},
{
"cve": "CVE-2024-23814",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23814",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23814.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-23814"
},
{
"cve": "CVE-2024-30105",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-30105"
},
{
"cve": "CVE-2024-41788",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41788.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41788"
},
{
"cve": "CVE-2024-41789",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41789"
},
{
"cve": "CVE-2024-41790",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41790",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41790"
},
{
"cve": "CVE-2024-41791",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41791"
},
{
"cve": "CVE-2024-41792",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41792"
},
{
"cve": "CVE-2024-41793",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41793.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41793"
},
{
"cve": "CVE-2024-41794",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41794",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41794"
},
{
"cve": "CVE-2024-41795",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41795"
},
{
"cve": "CVE-2024-41796",
"cwe": {
"id": "CWE-620",
"name": "Unverified Password Change"
},
"notes": [
{
"category": "other",
"text": "Unverified Password Change",
"title": "CWE-620"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41796"
},
{
"cve": "CVE-2024-54091",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54091.json"
}
],
"title": "CVE-2024-54091"
},
{
"cve": "CVE-2024-54092",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54092",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54092.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-54092"
},
{
"cve": "CVE-2025-30280",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-30280"
},
{
"cve": "CVE-2025-1097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1097.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1097"
},
{
"cve": "CVE-2025-24514",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24514",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24514.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-24514"
},
{
"cve": "CVE-2025-24513",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24513",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24513.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-24513"
},
{
"cve": "CVE-2025-1974",
"cwe": {
"id": "CWE-653",
"name": "Improper Isolation or Compartmentalization"
},
"notes": [
{
"category": "other",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1974"
},
{
"cve": "CVE-2025-1098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1098"
},
{
"cve": "CVE-2025-29999",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29999.json"
}
],
"title": "CVE-2025-29999"
},
{
"cve": "CVE-2025-30000",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30000",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30000.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-30000"
}
]
}
OPENSUSE-SU-2022:0149-1
Vulnerability from csaf_opensuse - Published: 2022-01-21 08:04 - Updated: 2022-01-21 08:04Summary
Security update for rust1.56
Severity
Moderate
Notes
Title of the patch: Security update for rust1.56
Description of the patch: This update for rust1.56 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames: openSUSE-2022-149,openSUSE-SLE-15.3-2022-149
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.2 (Medium)
Affected products
Recommended
38 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
8 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust1.56",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust1.56 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-149,openSUSE-SLE-15.3-2022-149",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0149-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0149-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0149-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/"
},
{
"category": "self",
"summary": "SUSE Bug 1194767",
"url": "https://bugzilla.suse.com/1194767"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21658 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21658/"
}
],
"title": "Security update for rust1.56",
"tracking": {
"current_release_date": "2022-01-21T08:04:54Z",
"generator": {
"date": "2022-01-21T08:04:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0149-1",
"initial_release_date": "2022-01-21T08:04:54Z",
"revision_history": [
{
"date": "2022-01-21T08:04:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"product": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"product_id": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"product": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"product_id": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libredwg0-0.12.5-bp153.2.3.1.aarch64",
"product": {
"name": "libredwg0-0.12.5-bp153.2.3.1.aarch64",
"product_id": "libredwg0-0.12.5-bp153.2.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "cargo1.56-1.56.1-150300.7.6.1.aarch64",
"product": {
"name": "cargo1.56-1.56.1-150300.7.6.1.aarch64",
"product_id": "cargo1.56-1.56.1-150300.7.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust1.56-1.56.1-150300.7.6.1.aarch64",
"product": {
"name": "rust1.56-1.56.1-150300.7.6.1.aarch64",
"product_id": "rust1.56-1.56.1-150300.7.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libredwg-devel-0.12.5-bp153.2.3.1.i586",
"product": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.i586",
"product_id": "libredwg-devel-0.12.5-bp153.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "libredwg-tools-0.12.5-bp153.2.3.1.i586",
"product": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.i586",
"product_id": "libredwg-tools-0.12.5-bp153.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "libredwg0-0.12.5-bp153.2.3.1.i586",
"product": {
"name": "libredwg0-0.12.5-bp153.2.3.1.i586",
"product_id": "libredwg0-0.12.5-bp153.2.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"product": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"product_id": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"product": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"product_id": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"product": {
"name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"product_id": "libredwg0-0.12.5-bp153.2.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"product": {
"name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"product_id": "cargo1.56-1.56.1-150300.7.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust1.56-1.56.1-150300.7.6.1.ppc64le",
"product": {
"name": "rust1.56-1.56.1-150300.7.6.1.ppc64le",
"product_id": "rust1.56-1.56.1-150300.7.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"product": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"product_id": "libredwg-devel-0.12.5-bp153.2.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"product": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"product_id": "libredwg-tools-0.12.5-bp153.2.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libredwg0-0.12.5-bp153.2.3.1.s390x",
"product": {
"name": "libredwg0-0.12.5-bp153.2.3.1.s390x",
"product_id": "libredwg0-0.12.5-bp153.2.3.1.s390x"
}
},
{
"category": "product_version",
"name": "cargo1.56-1.56.1-150300.7.6.1.s390x",
"product": {
"name": "cargo1.56-1.56.1-150300.7.6.1.s390x",
"product_id": "cargo1.56-1.56.1-150300.7.6.1.s390x"
}
},
{
"category": "product_version",
"name": "rust1.56-1.56.1-150300.7.6.1.s390x",
"product": {
"name": "rust1.56-1.56.1-150300.7.6.1.s390x",
"product_id": "rust1.56-1.56.1-150300.7.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"product": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"product_id": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"product": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"product_id": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libredwg0-0.12.5-bp153.2.3.1.x86_64",
"product": {
"name": "libredwg0-0.12.5-bp153.2.3.1.x86_64",
"product_id": "libredwg0-0.12.5-bp153.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cargo1.56-1.56.1-150300.7.6.1.x86_64",
"product": {
"name": "cargo1.56-1.56.1-150300.7.6.1.x86_64",
"product_id": "cargo1.56-1.56.1-150300.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust1.56-1.56.1-150300.7.6.1.x86_64",
"product": {
"name": "rust1.56-1.56.1-150300.7.6.1.x86_64",
"product_id": "rust1.56-1.56.1-150300.7.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64"
},
"product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64"
},
"product_reference": "cargo1.56-1.56.1-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64"
},
"product_reference": "rust1.56-1.56.1-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21658"
}
],
"notes": [
{
"category": "general",
"text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21658",
"url": "https://www.suse.com/security/cve/CVE-2022-21658"
},
{
"category": "external",
"summary": "SUSE Bug 1194767 for CVE-2022-21658",
"url": "https://bugzilla.suse.com/1194767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-21T08:04:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21658"
}
]
}
OPENSUSE-SU-2022:0171-1
Vulnerability from csaf_opensuse - Published: 2022-01-25 12:56 - Updated: 2022-01-25 12:56Summary
Security update for rust1.55
Severity
Moderate
Notes
Title of the patch: Security update for rust1.55
Description of the patch: This update for rust1.55 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames: openSUSE-SLE-15.3-2022-171
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.2 (Medium)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
8 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust1.55",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust1.55 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2022-171",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0171-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0171-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXNFO6HH5VY6DMGZN52EB2OJNJXKBC5H/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0171-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXNFO6HH5VY6DMGZN52EB2OJNJXKBC5H/"
},
{
"category": "self",
"summary": "SUSE Bug 1194767",
"url": "https://bugzilla.suse.com/1194767"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21658 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21658/"
}
],
"title": "Security update for rust1.55",
"tracking": {
"current_release_date": "2022-01-25T12:56:24Z",
"generator": {
"date": "2022-01-25T12:56:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0171-1",
"initial_release_date": "2022-01-25T12:56:24Z",
"revision_history": [
{
"date": "2022-01-25T12:56:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cargo1.55-1.55.0-150300.7.6.1.aarch64",
"product": {
"name": "cargo1.55-1.55.0-150300.7.6.1.aarch64",
"product_id": "cargo1.55-1.55.0-150300.7.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust1.55-1.55.0-150300.7.6.1.aarch64",
"product": {
"name": "rust1.55-1.55.0-150300.7.6.1.aarch64",
"product_id": "rust1.55-1.55.0-150300.7.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"product": {
"name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"product_id": "cargo1.55-1.55.0-150300.7.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust1.55-1.55.0-150300.7.6.1.ppc64le",
"product": {
"name": "rust1.55-1.55.0-150300.7.6.1.ppc64le",
"product_id": "rust1.55-1.55.0-150300.7.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cargo1.55-1.55.0-150300.7.6.1.s390x",
"product": {
"name": "cargo1.55-1.55.0-150300.7.6.1.s390x",
"product_id": "cargo1.55-1.55.0-150300.7.6.1.s390x"
}
},
{
"category": "product_version",
"name": "rust1.55-1.55.0-150300.7.6.1.s390x",
"product": {
"name": "rust1.55-1.55.0-150300.7.6.1.s390x",
"product_id": "rust1.55-1.55.0-150300.7.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cargo1.55-1.55.0-150300.7.6.1.x86_64",
"product": {
"name": "cargo1.55-1.55.0-150300.7.6.1.x86_64",
"product_id": "cargo1.55-1.55.0-150300.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust1.55-1.55.0-150300.7.6.1.x86_64",
"product": {
"name": "rust1.55-1.55.0-150300.7.6.1.x86_64",
"product_id": "rust1.55-1.55.0-150300.7.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.55-1.55.0-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64"
},
"product_reference": "cargo1.55-1.55.0-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le"
},
"product_reference": "cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.55-1.55.0-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x"
},
"product_reference": "cargo1.55-1.55.0-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cargo1.55-1.55.0-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64"
},
"product_reference": "cargo1.55-1.55.0-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.55-1.55.0-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64"
},
"product_reference": "rust1.55-1.55.0-150300.7.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.55-1.55.0-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le"
},
"product_reference": "rust1.55-1.55.0-150300.7.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.55-1.55.0-150300.7.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x"
},
"product_reference": "rust1.55-1.55.0-150300.7.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust1.55-1.55.0-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64"
},
"product_reference": "rust1.55-1.55.0-150300.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21658"
}
],
"notes": [
{
"category": "general",
"text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21658",
"url": "https://www.suse.com/security/cve/CVE-2022-21658"
},
{
"category": "external",
"summary": "SUSE Bug 1194767 for CVE-2022-21658",
"url": "https://bugzilla.suse.com/1194767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x",
"openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-25T12:56:24Z",
"details": "moderate"
}
],
"title": "CVE-2022-21658"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…