ssa-390195
Vulnerability from csaf_siemens
Published
2021-12-14 00:00
Modified
2021-12-14 00:00
Summary
SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products

Notes

Summary
Multiple LibVNC vulnerabilities in the affected products listed below could allow remote code execution, information disclosure and Denial-of-Service attacks under certain conditions. Siemens has released updates for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.



{
  "document": {
    "category": "Siemens Security Advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited.",
      "tlp": {
        "label": "WHITE"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Multiple LibVNC vulnerabilities in the affected products listed below could allow remote code execution, information disclosure and Denial-of-Service attacks under certain conditions.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"
      },
      {
        "category": "self",
        "summary": "SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-390195.txt"
      },
      {
        "category": "self",
        "summary": "SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-390195.json"
      }
    ],
    "title": "SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products",
    "tracking": {
      "current_release_date": "2021-12-14T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-390195",
      "initial_release_date": "2021-12-14T00:00:00Z",
      "revision_history": [
        {
          "date": "2021-12-14T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC1500 V3",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC1500 V3"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC1500 V3 PRO",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC1500 V3 PRO"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC1900 V3",
                  "product_id": "3"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC1900 V3"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC1900 V3 PRO",
                  "product_id": "4"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC1900 V3 PRO"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC2200 V3",
                  "product_id": "5"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC2200 V3"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V3.2.1.0",
                "product": {
                  "name": "SIMATIC ITC2200 V3 PRO",
                  "product_id": "6"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC ITC2200 V3 PRO"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-18922",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2017-18922 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-18922.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2017-18922"
    },
    {
      "cve": "CVE-2018-20019",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20019 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-20019.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2018-20019"
    },
    {
      "cve": "CVE-2018-20748",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20748 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-20748.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2018-20748"
    },
    {
      "cve": "CVE-2018-20749",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20749 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-20749.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2018-20749"
    },
    {
      "cve": "CVE-2018-20750",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-20750 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-20750.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2018-20750"
    },
    {
      "cve": "CVE-2018-21247",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2018-21247 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2018-21247.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2018-21247"
    },
    {
      "cve": "CVE-2019-15681",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15681 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-15681.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2019-15681"
    },
    {
      "cve": "CVE-2019-15690",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in libvncserver. An integer overflow within the HandleCursorShape() function can be exploited to cause a heap-based buffer overflow by tricking a user or application using libvncserver to connect to an unstrusted server and subsequently send cursor shapes with specially crafted dimensions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-15690 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-15690.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2019-15690"
    },
    {
      "cve": "CVE-2019-20788",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20788 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-20788.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2019-20788"
    },
    {
      "cve": "CVE-2019-20839",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20839 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-20839.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2019-20839"
    },
    {
      "cve": "CVE-2019-20840",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2019-20840 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-20840.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2019-20840"
    },
    {
      "cve": "CVE-2020-14396",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncclient/tls_openssl.c has a NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14396 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14396.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14396"
    },
    {
      "cve": "CVE-2020-14397",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14397 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14397.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14397"
    },
    {
      "cve": "CVE-2020-14398",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14398 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14398.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14398"
    },
    {
      "cve": "CVE-2020-14401",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14401 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14401.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14401"
    },
    {
      "cve": "CVE-2020-14402",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14402 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14402.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14402"
    },
    {
      "cve": "CVE-2020-14403",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14403 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14403.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14403"
    },
    {
      "cve": "CVE-2020-14404",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14404 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14404.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14404"
    },
    {
      "cve": "CVE-2020-14405",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6"
        ]
      },
      "references": [
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC1500 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC1500 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC1900 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC1900 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC2200 V3",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 - SIMATIC ITC2200 V3 PRO",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "summary": "CVE-2020-14405 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-14405.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V3.2.1.0 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109804128/"
        },
        {
          "category": "mitigation",
          "details": "Monitor and restrict access to port 5900/tcp to trusted IP addresses only",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "title": "CVE-2020-14405"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…