Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4652 (GCVE-0-2013-4652)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.124Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-07-31T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4652",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4652",
"datePublished": "2013-07-31T18:00:00Z",
"dateReserved": "2013-06-24T00:00:00Z",
"dateUpdated": "2024-09-16T22:26:37.770Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4652\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-08-01T13:32:26.093\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad sin especificar en el interfaz de gesti\u00f3n de los dispositivos Siemens Scalance W7xx con firmware anterior a 4.5.4, permite a atacantes remotos evitar la autenticaci\u00f3n y ejecutar c\u00f3digo arbitrario a trav\u00e9s de conexiones (1)SSH o (2)Telnet.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_w700_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"80AFB6C8-3330-4E4B-840C-72AB3C25B005\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w744-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F42D479-A09D-467E-A078-56AC8964FF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w744-1pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA38FD9E-6351-4799-9ED9-5C3613304B0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w746-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4620B2-80DA-492E-A3C5-030728AA31E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w746-1pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BF204A-FB9B-442B-973B-CFC7400AC88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w747-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3D4CCA-26A3-4676-93C0-51C81C878E60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w747-1rr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972DB709-ECDB-4997-B580-68576C9BB068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w784-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF75780-5A9F-4D46-A057-1A39E06CBA9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w784-1rr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7D8B71-AC38-4723-A87C-2EE4A3DEB827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w786-1pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3D27B5-CE66-4C4B-96F5-0F6F1E4AD6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w786-2pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9753A6CE-3792-4865-B506-FAD5F9E4F91B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w786-2rr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D056894-E0D7-4086-BCBA-817ECB6DD806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w786-3pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76465BC-A22F-44C8-8474-1848EF0BCFA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w788-1pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBFF410E-82DA-4B80-92A5-091970E969FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w788-1rr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5F0171-F7D9-4657-9CF9-C32CA4FA0902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w788-2pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB8DD7E-9CA8-46C4-9CEB-6A5B4E8A8B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_w788-2rr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A32A22-8C02-47C3-9969-B730C9114691\"}]}]}],\"references\":[{\"url\":\"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
ghsa-g58f-pj48-2p3r
Vulnerability from github
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.
{
"affected": [],
"aliases": [
"CVE-2013-4652"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-08-01T13:32:00Z",
"severity": "HIGH"
},
"details": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.",
"id": "GHSA-g58f-pj48-2p3r",
"modified": "2022-05-17T05:07:04Z",
"published": "2022-05-17T05:07:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4652"
},
{
"type": "WEB",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2013-AVI-456
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Siemens Scalance W-7xx. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W744-1PRO, W746-1PRO, W747-1RR",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W784-1, W784-1RR",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W744-1, W746-1, W747-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4652"
},
{
"name": "CVE-2013-4651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4651"
}
],
"initial_release_date": "2013-08-01T00:00:00",
"last_revision_date": "2013-08-01T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-456",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSiemens Scalance W-7xx\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le syst\u00e8me SCADA Siemens Scalance W-7xx",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-120908 du 31 juillet 2013",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
]
}
icsa-13-213-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-13-213-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2013/icsa-13-213-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-13-213-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-213-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens Scalance W-7xx Product Family Multiple Vulnerabilities",
"tracking": {
"current_release_date": "2025-06-06T22:54:47.674263Z",
"generator": {
"date": "2025-06-06T22:54:47.674220Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-13-213-01",
"initial_release_date": "2013-05-04T06:00:00.000000Z",
"revision_history": [
{
"date": "2013-05-04T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T22:54:47.674263Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "W744-1",
"product": {
"name": "Siemens SCALANCE: W744-1",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W746-1",
"product": {
"name": "Siemens SCALANCE: W746-1",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W747-1",
"product": {
"name": "Siemens SCALANCE: W747-1",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W744-1PRO",
"product": {
"name": "Siemens SCALANCE: W744-1PRO",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W746-1PRO",
"product": {
"name": "Siemens SCALANCE: W746-1PRO",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W747-1RR",
"product": {
"name": "Siemens SCALANCE: W747-1RR",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W784-1",
"product": {
"name": "Siemens SCALANCE: W784-1",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W784-1RR",
"product": {
"name": "Siemens SCALANCE: W784-1RR",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W786-1PRO",
"product": {
"name": "Siemens SCALANCE: W786-1PRO",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W786-2PRO",
"product": {
"name": "Siemens SCALANCE: W786-2PRO",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W786-3PRO",
"product": {
"name": "Siemens SCALANCE: W786-3PRO",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W786-2RR",
"product": {
"name": "Siemens SCALANCE: W786-2RR",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W788-1PRO",
"product": {
"name": "Siemens SCALANCE: W788-1PRO",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W788-2PRO",
"product": {
"name": "Siemens SCALANCE: W788-2PRO",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W788-1RR",
"product": {
"name": "Siemens SCALANCE: W788-1RR",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "W788-2RR",
"product": {
"name": "Siemens SCALANCE: W788-2RR",
"product_id": "CSAFPID-0016"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "6GK5_7xx-xAxx0-xAx0",
"product": {
"name": "Siemens SCALANCE: 6GK5_7xx-xAxx0-xAx0",
"product_id": "CSAFPID-0017"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "6GK5_7xx-xBxx0-xAx0",
"product": {
"name": "Siemens SCALANCE: 6GK5_7xx-xBxx0-xAx0",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "SCALANCE"
},
{
"branches": [
{
"category": "product_version",
"name": "6GK5_746-1AA60-4BA0",
"product": {
"name": "Siemens SCALANCE: 6GK5_746-1AA60-4BA0",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "SCALANCE"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4651",
"cwe": {
"id": "CWE-1392",
"name": "Use of Default Credentials"
},
"notes": [
{
"category": "summary",
"text": "Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers\u0027 installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate\u0027s trust relationship.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced a software update that resolves these vulnerabilities. The update can be applied to all versions of Scalance. Siemens recommends that asset owners and operators contact Siemens customer support to acquire the update. Siemens update information is located here: (http://support.automation.siemens.com/WW/view/en/77427398)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "http://support.automation.siemens.com/WW/view/en/77427398"
},
{
"category": "mitigation",
"details": "Siemens security advisory is located here: (http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 6.6,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
]
},
{
"cve": "CVE-2013-4652",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced a software update that resolves these vulnerabilities. The update can be applied to all versions of Scalance. Siemens recommends that asset owners and operators contact Siemens customer support to acquire the update. Siemens update information is located here: (http://support.automation.siemens.com/WW/view/en/77427398)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "http://support.automation.siemens.com/WW/view/en/77427398"
},
{
"category": "mitigation",
"details": "Siemens security advisory is located here: (http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 10.0,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019"
]
}
]
}
]
}
var-201308-0352
Vulnerability from variot
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version < v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and completely compromise an affected system. Siemens Scalance W-700 Series running firmware versions prior to 4.5.4 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0352",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "scalance w747-1rr",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w746-1pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w747-1",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w744-1pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-2pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w784-1",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-2rr",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w746-1",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-1rr",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-2pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-1pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-2rr",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w784-1rr",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-1pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w744-1",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-3pro",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w700 series",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "4.4.0"
},
{
"model": "scalance w700 series",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "4.4.0"
},
{
"model": "scalance w700 series",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "4.5.4"
},
{
"model": "scalance w744-1",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w744-1pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w746-1",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w746-1pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w747-1",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w747-1rr",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w784-1",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w784-1rr",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-1pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-2pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-2rr",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w786-3pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-1pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-1rr",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-2pro",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w788-2rr",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w-700 series",
"scope": null,
"trust": 0.6,
"vendor": "siemens",
"version": null
},
{
"model": "scalance w-7xx product family",
"scope": "lt",
"trust": 0.2,
"vendor": "siemens",
"version": "4.5.4"
}
],
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:siemens:scalance_w700_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w744-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w744-1pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w746-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w746-1pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w747-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w747-1rr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w784-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w784-1rr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w786-1pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w786-2pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w786-2rr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w786-3pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w788-1pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w788-1rr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w788-2pro",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:siemens:scalance_w788-2rr",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "61540"
}
],
"trust": 0.3
},
"cve": "CVE-2013-4652",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-4652",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-11279",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "ce08814a-2352-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-64654",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-4652",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2013-4652",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-11279",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201307-684",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-64654",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "VULHUB",
"id": "VHN-64654"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version \u003c v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and completely compromise an affected system. \nSiemens Scalance W-700 Series running firmware versions prior to 4.5.4 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4652"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "BID",
"id": "61540"
},
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-64654"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4652",
"trust": 3.6
},
{
"db": "SIEMENS",
"id": "SSA-120908",
"trust": 2.3
},
{
"db": "BID",
"id": "61540",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-11279",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-13-213-01",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "54168",
"trust": 0.6
},
{
"db": "IVD",
"id": "CE08814A-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-89656",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-64654",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "VULHUB",
"id": "VHN-64654"
},
{
"db": "BID",
"id": "61540"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"id": "VAR-201308-0352",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "VULHUB",
"id": "VHN-64654"
}
],
"trust": 1.5855504666666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
}
]
},
"last_update_date": "2024-11-23T22:35:19.830000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-120908",
"trust": 0.8,
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
},
{
"title": "Siemens Scalance W-700 Series Authentication Vulnerability Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/37985"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4652"
},
{
"trust": 0.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-13-213-01"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4652"
},
{
"trust": 0.6,
"url": "http://www.secunia.com/advisories/54168/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/61540"
},
{
"trust": 0.3,
"url": "http://subscriber.communications.siemens.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "VULHUB",
"id": "VHN-64654"
},
{
"db": "BID",
"id": "61540"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"db": "VULHUB",
"id": "VHN-64654"
},
{
"db": "BID",
"id": "61540"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-08-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"date": "2013-08-01T00:00:00",
"db": "VULHUB",
"id": "VHN-64654"
},
{
"date": "2013-07-31T00:00:00",
"db": "BID",
"id": "61540"
},
{
"date": "2013-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"date": "2013-07-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"date": "2013-08-01T13:32:26.093000",
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-11279"
},
{
"date": "2013-08-01T00:00:00",
"db": "VULHUB",
"id": "VHN-64654"
},
{
"date": "2013-08-01T17:26:00",
"db": "BID",
"id": "61540"
},
{
"date": "2013-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003625"
},
{
"date": "2013-08-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201307-684"
},
{
"date": "2024-11-21T01:55:59.513000",
"db": "NVD",
"id": "CVE-2013-4652"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens Scalance W-700 Series Authentication Bypass Vulnerability",
"sources": [
{
"db": "IVD",
"id": "ce08814a-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-11279"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201307-684"
}
],
"trust": 0.6
}
}
gsd-2013-4652
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2013-4652",
"description": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.",
"id": "GSD-2013-4652"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-4652"
],
"details": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.",
"id": "GSD-2013-4652",
"modified": "2023-12-13T01:22:16.586093Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4652",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:scalance_w700_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w788-1rr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w788-2rr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w744-1pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w746-1pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w747-1rr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w786-2pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w747-1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w788-2pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w786-3pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w784-1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w784-1rr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w744-1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w786-1pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w786-2rr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w746-1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w788-1pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4652"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-08-01T16:23Z",
"publishedDate": "2013-08-01T13:32Z"
}
}
}
fkie_cve-2013-4652
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | scalance_w700_series_firmware | * | |
| siemens | scalance_w744-1 | - | |
| siemens | scalance_w744-1pro | - | |
| siemens | scalance_w746-1 | - | |
| siemens | scalance_w746-1pro | - | |
| siemens | scalance_w747-1 | - | |
| siemens | scalance_w747-1rr | - | |
| siemens | scalance_w784-1 | - | |
| siemens | scalance_w784-1rr | - | |
| siemens | scalance_w786-1pro | - | |
| siemens | scalance_w786-2pro | - | |
| siemens | scalance_w786-2rr | - | |
| siemens | scalance_w786-3pro | - | |
| siemens | scalance_w788-1pro | - | |
| siemens | scalance_w788-1rr | - | |
| siemens | scalance_w788-2pro | - | |
| siemens | scalance_w788-2rr | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:scalance_w700_series_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80AFB6C8-3330-4E4B-840C-72AB3C25B005",
"versionEndIncluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_w744-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F42D479-A09D-467E-A078-56AC8964FF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w744-1pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA38FD9E-6351-4799-9ED9-5C3613304B0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w746-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4620B2-80DA-492E-A3C5-030728AA31E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w746-1pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF204A-FB9B-442B-973B-CFC7400AC88D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w747-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3D4CCA-26A3-4676-93C0-51C81C878E60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w747-1rr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "972DB709-ECDB-4997-B580-68576C9BB068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w784-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF75780-5A9F-4D46-A057-1A39E06CBA9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w784-1rr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7D8B71-AC38-4723-A87C-2EE4A3DEB827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w786-1pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3D27B5-CE66-4C4B-96F5-0F6F1E4AD6D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w786-2pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9753A6CE-3792-4865-B506-FAD5F9E4F91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w786-2rr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D056894-E0D7-4086-BCBA-817ECB6DD806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w786-3pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E76465BC-A22F-44C8-8474-1848EF0BCFA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w788-1pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFF410E-82DA-4B80-92A5-091970E969FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w788-1rr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F5F0171-F7D9-4657-9CF9-C32CA4FA0902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w788-2pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB8DD7E-9CA8-46C4-9CEB-6A5B4E8A8B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:siemens:scalance_w788-2rr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17A32A22-8C02-47C3-9969-B730C9114691",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en el interfaz de gesti\u00f3n de los dispositivos Siemens Scalance W7xx con firmware anterior a 4.5.4, permite a atacantes remotos evitar la autenticaci\u00f3n y ejecutar c\u00f3digo arbitrario a trav\u00e9s de conexiones (1)SSH o (2)Telnet."
}
],
"id": "CVE-2013-4652",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-08-01T13:32:26.093",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.