var-201308-0351
Vulnerability from variot

Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version < v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR. Attackers can exploit this issue to spoof a valid server and conduct man-in-the-middle attacks. Successful exploits will cause victims to accept the certificates assuming they are from a legitimate site. Siemens Scalance W-700 series running firmware versions prior to 4.5.4 are vulnerable

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0351",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "scalance w788-2rr",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-1rr",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w746-1",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w747-1",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w784-1rr",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w744-1pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-2pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-1pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-2rr",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-1pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w784-1",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w746-1pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w747-1rr",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-2pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-3pro",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w744-1",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w700 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "4.4.0"
      },
      {
        "model": "scalance w700 series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "4.4.0"
      },
      {
        "model": "scalance w700 series",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "4.5.4"
      },
      {
        "model": "scalance w744-1",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w744-1pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w746-1",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w746-1pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w747-1",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w747-1rr",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w784-1",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w784-1rr",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-1pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-2pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-2rr",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w786-3pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-1pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-1rr",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-2pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w788-2rr",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w-700 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "scalance w-7xx product family",
        "scope": "lt",
        "trust": 0.2,
        "vendor": "siemens",
        "version": "4.5.4"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:siemens:scalance_w700_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w744-1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w744-1pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w746-1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w746-1pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w747-1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w747-1rr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w784-1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w784-1rr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w786-1pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w786-2pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w786-2rr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w786-3pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w788-1pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w788-1rr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w788-2pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:siemens:scalance_w788-2rr",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "61539"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4651",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2013-4651",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2013-11278",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-64653",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4651",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-4651",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-11278",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201307-683",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64653",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2013-4651",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers\u0027 installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate\u0027s trust relationship. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version \u003c v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR. \nAttackers can exploit this issue to spoof a valid server and conduct man-in-the-middle attacks. Successful exploits will cause victims to accept the certificates assuming they are from a legitimate site. \nSiemens Scalance W-700 series running firmware versions prior to 4.5.4 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "BID",
        "id": "61539"
      },
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4651",
        "trust": 3.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-120908",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "61539",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-213-01",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "54168",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "CE0D3BE0-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89662",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "db": "BID",
        "id": "61539"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "id": "VAR-201308-0351",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      }
    ],
    "trust": 1.5855504666666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:35:19.789000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-120908",
        "trust": 0.8,
        "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
      },
      {
        "title": "Siemens Scalance W-700 Series Patch with built-in SSL certificate spoofing vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/37984"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-120908.pdf"
      },
      {
        "trust": 0.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-213-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4651"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4651"
      },
      {
        "trust": 0.7,
        "url": "http://www.securityfocus.com/bid/61539"
      },
      {
        "trust": 0.6,
        "url": "http://www.secunia.com/advisories/54168/"
      },
      {
        "trust": 0.3,
        "url": "http://subscriber.communications.siemens.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/255.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30283"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "db": "BID",
        "id": "61539"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "db": "BID",
        "id": "61539"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-05T00:00:00",
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "BID",
        "id": "61539"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "date": "2013-08-01T13:32:26.067000",
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-11278"
      },
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64653"
      },
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-4651"
      },
      {
        "date": "2013-08-01T17:26:00",
        "db": "BID",
        "id": "61539"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      },
      {
        "date": "2013-08-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      },
      {
        "date": "2024-11-21T01:55:59.370000",
        "db": "NVD",
        "id": "CVE-2013-4651"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens SCALANCE W700 In the series firmware  SSL Vulnerability to perform man-in-the-middle attacks on sessions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003624"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trust management",
    "sources": [
      {
        "db": "IVD",
        "id": "ce0d3be0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201307-683"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…