var-201803-2158
Vulnerability from variot
A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it. TIM 1531 IRC Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens TIM 1531 IRC is a communication module from Siemens AG in Germany for processing data transmissions using the Siemens remote control protocol SINAUT ST7. An attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2158", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tim 1531 irc", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "1.1" }, { "model": "tim irc", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1531\u003c1.0" }, { "model": "tim irc", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "15311.0" }, { "model": "tim irc", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "15311.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "tim 1531 irc", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "BID", "id": "103576" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:tim_1531_irc_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003574" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "103576" } ], "trust": 0.3 }, "cve": "CVE-2018-4841", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2018-4841", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2018-07036", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-4841", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-4841", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-4841", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-4841", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-07036", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-1133", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2018-4841", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "VULMON", "id": "CVE-2018-4841" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in TIM 1531 IRC (All versions \u003c V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it. TIM 1531 IRC Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens TIM 1531 IRC is a communication module from Siemens AG in Germany for processing data transmissions using the Siemens remote control protocol SINAUT ST7. \nAn attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2018-4841" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "BID", "id": "103576" }, { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "VULMON", "id": "CVE-2018-4841" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-4841", "trust": 3.6 }, { "db": "BID", "id": "103576", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-18-088-02", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-110922", "trust": 1.7 }, { "db": "CNVD", "id": "CNVD-2018-07036", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-1133", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-003574", "trust": 0.8 }, { "db": "IVD", "id": "E2EA7D80-39AB-11E9-9A69-000C29342CB1", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2018-4841", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "VULMON", "id": "CVE-2018-4841" }, { "db": "BID", "id": "103576" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "id": "VAR-201803-2158", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" } ], "trust": 1.6636364000000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" } ] }, "last_update_date": "2024-11-23T21:53:17.899000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-110922", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf" }, { "title": "Siemens TIM 1531 IRC Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/124861" }, { "title": "Siemens TIM 1531 IRC Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82885" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=12885f7d95d11b73fe4d1a1708218101" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "VULMON", "id": "CVE-2018-4841" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNNVD", "id": "CNNVD-201803-1133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-303", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/103576" }, { "trust": 1.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-088-02" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4841" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4841" }, { "trust": 0.3, "url": "http://www.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "VULMON", "id": "CVE-2018-4841" }, { "db": "BID", "id": "103576" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" }, { "db": "VULMON", "id": "CVE-2018-4841" }, { "db": "BID", "id": "103576" }, { "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "db": "NVD", "id": "CVE-2018-4841" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-04T00:00:00", "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "date": "2018-04-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-07036" }, { "date": "2018-03-29T00:00:00", "db": "VULMON", "id": "CVE-2018-4841" }, { "date": "2018-03-29T00:00:00", "db": "BID", "id": "103576" }, { "date": "2018-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "date": "2018-03-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "date": "2018-03-29T13:29:00.210000", "db": "NVD", "id": "CVE-2018-4841" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-07036" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2018-4841" }, { "date": "2018-03-29T00:00:00", "db": "BID", "id": "103576" }, { "date": "2018-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003574" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-1133" }, { "date": "2024-11-21T04:07:33.813000", "db": "NVD", "id": "CVE-2018-4841" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens TIM 1531 IRC Security Bypass Vulnerability", "sources": [ { "db": "IVD", "id": "e2ea7d80-39ab-11e9-9a69-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07036" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-1133" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.