var-201906-0203
Vulnerability from variot

A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known. SIEMENS LOGO!8 Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. LOGO!8 is the 8th generation intelligent logic controller of Siemens. It is the NanoPLC in the Siemens PLC family. It simplifies the programming configuration, the integrated panel can display more content, and can be easily integrated efficiently through the integrated Ethernet interface. interconnected. A buffer error vulnerability exists in SiemensLOGO!8. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. Siemens LOGO!8 Devices are prone to multiple security vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0203",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "logo\\!8",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.81.00"
      },
      {
        "model": "logo\\!8",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.80.00"
      },
      {
        "model": "logo\\!8",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.82.00"
      },
      {
        "model": "logo!8",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "siemens",
        "version": "1.82.01"
      },
      {
        "model": "6ed1052-1cc08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-1fb08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-1hb08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-1md08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2cc08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2fb00-0ba8",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2fb08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2hb08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2md00-0ba8",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "6ed1052-2md08-0ba0",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "6ed1052 1fb00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "6ed1052 1fb00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "6ed1052 2md00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "6ed1052 2md00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": "logo!8",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "1.82.02"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1cc08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2fb00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2fb00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2hb00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2hb00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1md00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1md00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2cc01 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2cc01 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1cc01 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1cc01 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1hb00 0ba8",
        "version": "1.80.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1hb00 0ba8",
        "version": "1.81.xx"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1fb08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1hb08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 1md08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2cc08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2fb08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2hb08 0ba0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "6ed1052 2md08 0ba0",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "BID",
        "id": "108728"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-1cc08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-1fb08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-1hb08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-1md08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2cc08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2fb00-0ba8_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2fb08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2hb08-0ba0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2md00-0ba8_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:6ed1052-2md08-0ba0_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "and Christian Siemers and Irakli Edjibia from Hochschule Augsburg reported these vulnerabilities to Siemens., and Christian Siemers and Irakli Edjibia from Hochschule Augsburg,Thomas Meesters from cirosec GmbH and Ruhr University of Bochum",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-6571",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-6571",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-17151",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-158006",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-6571",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-6571",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-6571",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-6571",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-17151",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201906-521",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-158006",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version \u003c V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known. SIEMENS LOGO!8 Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. LOGO!8 is the 8th generation intelligent logic controller of Siemens. It is the NanoPLC in the Siemens PLC family. It simplifies the programming configuration, the integrated panel can display more content, and can be easily integrated efficiently through the integrated Ethernet interface. interconnected. A buffer error vulnerability exists in SiemensLOGO!8. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. Siemens LOGO!8 Devices are prone to multiple security vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "BID",
        "id": "108728"
      },
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-6571",
        "trust": 3.6
      },
      {
        "db": "SIEMENS",
        "id": "SSA-774850",
        "trust": 2.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-162-03",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "108728",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "C64B4706-2FDE-4842-9DED-B92B3CDEF24B",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "db": "BID",
        "id": "108728"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "id": "VAR-201906-0203",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      }
    ],
    "trust": 1.7333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:51:44.674000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-774850",
        "trust": 0.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
      },
      {
        "title": "Patch for SiemensLOGO!8 Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/163433"
      },
      {
        "title": "Siemens LOGO!8 Fixes for access control error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93755"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-284",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
      },
      {
        "trust": 0.9,
        "url": "http://www.siemens.com/"
      },
      {
        "trust": 0.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-162-03"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6571"
      },
      {
        "trust": 0.8,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-162-03"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6571"
      },
      {
        "trust": 0.6,
        "url": "https://www.securityfocus.com/bid/108728"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "db": "BID",
        "id": "108728"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "db": "BID",
        "id": "108728"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-13T00:00:00",
        "db": "IVD",
        "id": "c64b4706-2fde-4842-9ded-b92b3cdef24b"
      },
      {
        "date": "2019-06-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "date": "2019-06-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "date": "2019-06-11T00:00:00",
        "db": "BID",
        "id": "108728"
      },
      {
        "date": "2019-06-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "date": "2019-06-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "date": "2019-06-12T14:29:05.820000",
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-17151"
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158006"
      },
      {
        "date": "2019-06-11T00:00:00",
        "db": "BID",
        "id": "108728"
      },
      {
        "date": "2019-07-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      },
      {
        "date": "2020-10-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      },
      {
        "date": "2024-11-21T04:46:43.530000",
        "db": "NVD",
        "id": "CVE-2019-6571"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SIEMENS LOGO!8 Access control vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-005571"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-521"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…