VDE-2018-003
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2018-03-23 09:43 - Updated: 2025-10-01 08:00Summary
PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities
Notes
Summary: Several CPUs manufactured by Intel, AMD or based on ARM technology may leak information due to their internal operation if attacked by specifically written software executed on the affected systems.
The information in this advisory is based on the statements of respective manufacturers.
Impact: Microprocessors from Intel and AMD using the x86 architecture and some microprocessors using the ARM, PowerPC, and MIPS architecture may be susceptible to a group of attacks named Meltdown and Spectre. These attacks may lead to a (complete) disclosure of information in the memory of systems. Integrity and availability are not affected, but information gained using these weaknesses may be used in further attacks.
Meltdown [CVE-2017-5754] allows reading the complete memory of the attacked system using a specifically crafted executable code.
Spectre [version 1: CVE-2017-5753, version 2: CVE-2017-5715] allows reading the memory of other processes using a specifically crafted executable code or dynamic code as used in web browsers.
Only those systems can be affected that allow the installation/execution of custom code or load dynamic contents from foreign/untrusted sources. If only the root/administrative user can install/execute custom code, no additional risk exists, as the root/administrative user can read the information without exploiting this vulnerability. If a web browser can be used to view foreign web pages, the Spectre attack must be considered.
Systems that do not allow installation/execution of custom code are not affected.
Remediation: On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
5.6 (Medium)
Vendor Fix
On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
5.6 (Medium)
Vendor Fix
On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
5.6 (Medium)
Vendor Fix
On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.
References
Acknowledgments
CERT@VDE
certvde.com
Google Project Zero
Jann Horn
Cyberus Technology
Werner Haas
Thomas Prescher
Graz University of Technology
Daniel Gruss
Moritz Lipp
Stefan Mangard
Michael Schwarz
University of Pennsylvania and University of Maryland
Paul Kocher
Daniel Genkin
Rambus
Mike Hamburg
Graz University of Technology
Moritz Lipp
University of Adelaide and Data61
Yuval Yarom
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero",
"summary": "publishing the Meltdown attack \u0026 Spectre attack on https://meltdownattack.com/"
},
{
"names": [
"Werner Haas",
"Thomas Prescher"
],
"organization": "Cyberus Technology",
"summary": "publishing the Meltdown attack on https://meltdownattack.com/"
},
{
"names": [
"Daniel Gruss",
"Moritz Lipp",
"Stefan Mangard",
"Michael Schwarz"
],
"organization": "Graz University of Technology",
"summary": "publishing the Meltdown attack on https://meltdownattack.com/"
},
{
"names": [
"Paul Kocher",
"Daniel Genkin"
],
"organization": "University of Pennsylvania and University of Maryland",
"summary": "publishing the Spectre attack on https://meltdownattack.com/"
},
{
"names": [
"Mike Hamburg"
],
"organization": "Rambus",
"summary": "publishing the Spectre attack on https://meltdownattack.com/"
},
{
"names": [
"Moritz Lipp"
],
"organization": "Graz University of Technology",
"summary": "publishing the Spectre attack on https://meltdownattack.com/"
},
{
"names": [
"Yuval Yarom"
],
"organization": "University of Adelaide and Data61",
"summary": "publishing the Spectre attack on https://meltdownattack.com/"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Several CPUs manufactured by Intel, AMD or based on ARM technology may leak information due to their internal operation if attacked by specifically written software executed on the affected systems.\n\nThe information in this advisory is based on the statements of respective manufacturers.",
"title": "Summary"
},
{
"category": "description",
"text": "Microprocessors from Intel and AMD using the x86 architecture and some microprocessors using the ARM, PowerPC, and MIPS architecture may be susceptible to a group of attacks named Meltdown and Spectre. These attacks may lead to a (complete) disclosure of information in the memory of systems. Integrity and availability are not affected, but information gained using these weaknesses may be used in further attacks.\n\nMeltdown [CVE-2017-5754] allows reading the complete memory of the attacked system using a specifically crafted executable code.\n\nSpectre [version 1: CVE-2017-5753, version 2: CVE-2017-5715] allows reading the memory of other processes using a specifically crafted executable code or dynamic code as used in web browsers.\n\nOnly those systems can be affected that allow the installation/execution of custom code or load dynamic contents from foreign/untrusted sources. If only the root/administrative user can install/execute custom code, no additional risk exists, as the root/administrative user can read the information without exploiting this vulnerability. If a web browser can be used to view foreign web pages, the Spectre attack must be considered.\n\nSystems that do not allow installation/execution of custom code are not affected.",
"title": "Impact"
},
{
"category": "description",
"text": "On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT advisory overview at CERT@VDE",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2018-003: PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities - HTML",
"url": "https://certvde.com/en/advisories/VDE-2018-003"
},
{
"category": "self",
"summary": "VDE-2018-003: PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2018/vde-2018-003.json"
}
],
"title": "PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities",
"tracking": {
"aliases": [
"VDE-2018-003"
],
"current_release_date": "2025-10-01T08:00:00.000Z",
"generator": {
"date": "2025-09-30T12:05:49.641Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.36"
}
},
"id": "VDE-2018-003",
"initial_release_date": "2018-03-23T09:43:00.000Z",
"revision_history": [
{
"date": "2018-03-23T09:43:00.000Z",
"number": "1.0.0",
"summary": "Initial revision."
},
{
"date": "2025-05-14T13:00:14.000Z",
"number": "2.0.0",
"summary": "Fix: added distribution"
},
{
"date": "2025-10-01T08:00:00.000Z",
"number": "2.0.1",
"summary": "Expressions errors were corrected in the acknowledgements."
}
],
"status": "final",
"version": "2.0.1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC 3051",
"product": {
"name": "AXC 3051",
"product_id": "CSAFPID-11001"
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "BL2 BPC 1000",
"product": {
"name": "BL2 BPC 1000",
"product_id": "CSAFPID-11003"
}
},
{
"category": "product_name",
"name": "BL2 BPC 2000",
"product": {
"name": "BL2 BPC 2000",
"product_id": "CSAFPID-11004"
}
},
{
"category": "product_name",
"name": "BL2 BPC 7000",
"product": {
"name": "BL2 BPC 7000",
"product_id": "CSAFPID-11005"
}
},
{
"category": "product_name",
"name": "BL2 PPC 1000",
"product": {
"name": "BL2 PPC 1000",
"product_id": "CSAFPID-11006"
}
},
{
"category": "product_name",
"name": "BL2 PPC 2000",
"product": {
"name": "BL2 PPC 2000",
"product_id": "CSAFPID-11007"
}
},
{
"category": "product_name",
"name": "BL2 PPC 7000",
"product": {
"name": "BL2 PPC 7000",
"product_id": "CSAFPID-11008"
}
},
{
"category": "product_name",
"name": "BL BPC 2000",
"product": {
"name": "BL BPC 2000",
"product_id": "CSAFPID-11009"
}
},
{
"category": "product_name",
"name": "BL BPC 2001",
"product": {
"name": "BL BPC 2001",
"product_id": "CSAFPID-11010"
}
},
{
"category": "product_name",
"name": "BL BPC 3000",
"product": {
"name": "BL BPC 3000",
"product_id": "CSAFPID-11011"
}
},
{
"category": "product_name",
"name": "BL BPC 3001",
"product": {
"name": "BL BPC 3001",
"product_id": "CSAFPID-11012"
}
},
{
"category": "product_name",
"name": "BL BPC 7000",
"product": {
"name": "BL BPC 7000",
"product_id": "CSAFPID-11013"
}
},
{
"category": "product_name",
"name": "BL BPC 7001",
"product": {
"name": "BL BPC 7001",
"product_id": "CSAFPID-11014"
}
},
{
"category": "product_name",
"name": "BL PPC 1000",
"product": {
"name": "BL PPC 1000",
"product_id": "CSAFPID-11015"
}
},
{
"category": "product_name",
"name": "BL PPC12 1000",
"product": {
"name": "BL PPC12 1000",
"product_id": "CSAFPID-11016"
}
},
{
"category": "product_name",
"name": "BL PPC15 1000",
"product": {
"name": "BL PPC15 1000",
"product_id": "CSAFPID-11017"
}
},
{
"category": "product_name",
"name": "BL PPC15 3000",
"product": {
"name": "BL PPC15 3000",
"product_id": "CSAFPID-11018"
}
},
{
"category": "product_name",
"name": "BL PPC15 7000",
"product": {
"name": "BL PPC15 7000",
"product_id": "CSAFPID-11019"
}
},
{
"category": "product_name",
"name": "BL PPC17 1000",
"product": {
"name": "BL PPC17 1000",
"product_id": "CSAFPID-11020"
}
},
{
"category": "product_name",
"name": "BL PPC17 3000",
"product": {
"name": "BL PPC17 3000",
"product_id": "CSAFPID-11021"
}
},
{
"category": "product_name",
"name": "BL PPC17 7000",
"product": {
"name": "BL PPC17 7000",
"product_id": "CSAFPID-11022"
}
},
{
"category": "product_name",
"name": "BL PPC 7000",
"product": {
"name": "BL PPC 7000",
"product_id": "CSAFPID-11023"
}
},
{
"category": "product_name",
"name": "BL RACKMOUNT 2U",
"product": {
"name": "BL RACKMOUNT 2U",
"product_id": "CSAFPID-11024"
}
},
{
"category": "product_name",
"name": "BL RACKMOUNT 4U",
"product": {
"name": "BL RACKMOUNT 4U",
"product_id": "CSAFPID-11025"
}
},
{
"category": "product_name",
"name": "DL PPC15 1000",
"product": {
"name": "DL PPC15 1000",
"product_id": "CSAFPID-11026"
}
},
{
"category": "product_name",
"name": "DL PPC15M 7000",
"product": {
"name": "DL PPC15M 7000",
"product_id": "CSAFPID-11027"
}
},
{
"category": "product_name",
"name": "DL PPC18.5M 7000",
"product": {
"name": "DL PPC18.5M 7000",
"product_id": "CSAFPID-11028"
}
},
{
"category": "product_name",
"name": "DL PPC21.5M 7000",
"product": {
"name": "DL PPC21.5M 7000",
"product_id": "CSAFPID-11029"
}
},
{
"category": "product_name",
"name": "EL PPC 1000",
"product": {
"name": "EL PPC 1000",
"product_id": "CSAFPID-11030"
}
},
{
"category": "product_name",
"name": "EL PPC 1000/M",
"product": {
"name": "EL PPC 1000/M",
"product_id": "CSAFPID-11031"
}
},
{
"category": "product_name",
"name": "EL PPC 1000/WT",
"product": {
"name": "EL PPC 1000/WT",
"product_id": "CSAFPID-11032"
}
},
{
"category": "product_name",
"name": "TP 3000",
"product": {
"name": "TP 3000",
"product_id": "CSAFPID-11033"
}
},
{
"category": "product_name",
"name": "TP 3000/P",
"product": {
"name": "TP 3000/P",
"product_id": "CSAFPID-11034"
}
},
{
"category": "product_name",
"name": "TP 3000/WT",
"product": {
"name": "TP 3000/WT",
"product_id": "CSAFPID-11035"
}
},
{
"category": "product_name",
"name": "TPM 3000",
"product": {
"name": "TPM 3000",
"product_id": "CSAFPID-11036"
}
},
{
"category": "product_name",
"name": "VALUELINE IPC",
"product": {
"name": "VALUELINE IPC",
"product_id": "CSAFPID-11037"
}
},
{
"category": "product_name",
"name": "VL2 BPC 1000",
"product": {
"name": "VL2 BPC 1000",
"product_id": "CSAFPID-11038"
}
},
{
"category": "product_name",
"name": "VL2 BPC 2000",
"product": {
"name": "VL2 BPC 2000",
"product_id": "CSAFPID-11039"
}
},
{
"category": "product_name",
"name": "VL2 BPC 3000",
"product": {
"name": "VL2 BPC 3000",
"product_id": "CSAFPID-11040"
}
},
{
"category": "product_name",
"name": "VL2 BPC 7000",
"product": {
"name": "VL2 BPC 7000",
"product_id": "CSAFPID-11041"
}
},
{
"category": "product_name",
"name": "VL2 BPC 9000",
"product": {
"name": "VL2 BPC 9000",
"product_id": "CSAFPID-11042"
}
},
{
"category": "product_name",
"name": "VL2 PPC 1000",
"product": {
"name": "VL2 PPC 1000",
"product_id": "CSAFPID-11043"
}
},
{
"category": "product_name",
"name": "VL2 PPC12 1000",
"product": {
"name": "VL2 PPC12 1000",
"product_id": "CSAFPID-11044"
}
},
{
"category": "product_name",
"name": "VL2 PPC 2000",
"product": {
"name": "VL2 PPC 2000",
"product_id": "CSAFPID-11045"
}
},
{
"category": "product_name",
"name": "VL2 PPC 3000",
"product": {
"name": "VL2 PPC 3000",
"product_id": "CSAFPID-11046"
}
},
{
"category": "product_name",
"name": "VL2 PPC 7000",
"product": {
"name": "VL2 PPC 7000",
"product_id": "CSAFPID-11047"
}
},
{
"category": "product_name",
"name": "VL2 PPC7 1000",
"product": {
"name": "VL2 PPC7 1000",
"product_id": "CSAFPID-11048"
}
},
{
"category": "product_name",
"name": "VL2 PPC 9000",
"product": {
"name": "VL2 PPC 9000",
"product_id": "CSAFPID-11049"
}
},
{
"category": "product_name",
"name": "VL2 PPC9 1000",
"product": {
"name": "VL2 PPC9 1000",
"product_id": "CSAFPID-11050"
}
},
{
"category": "product_name",
"name": "VL BPC 1000",
"product": {
"name": "VL BPC 1000",
"product_id": "CSAFPID-11051"
}
},
{
"category": "product_name",
"name": "VL BPC 2000",
"product": {
"name": "VL BPC 2000",
"product_id": "CSAFPID-11052"
}
},
{
"category": "product_name",
"name": "VL BPC 3000",
"product": {
"name": "VL BPC 3000",
"product_id": "CSAFPID-11053"
}
},
{
"category": "product_name",
"name": "VL IPC P7000",
"product": {
"name": "VL IPC P7000",
"product_id": "CSAFPID-11054"
}
},
{
"category": "product_name",
"name": "VL PPC 2000",
"product": {
"name": "VL PPC 2000",
"product_id": "CSAFPID-11055"
}
},
{
"category": "product_name",
"name": "VL PPC 3000",
"product": {
"name": "VL PPC 3000",
"product_id": "CSAFPID-11056"
}
},
{
"category": "product_name",
"name": "WP 3000",
"product": {
"name": "WP 3000",
"product_id": "CSAFPID-11057"
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware \u003c= current version",
"product_id": "CSAFPID-21001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
],
"summary": "affected product."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on AXC 3051",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on AXC F 2152",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 BPC 1000",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 BPC 2000",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 BPC 7000",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 PPC 1000",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 PPC 2000",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL2 PPC 7000",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 2000",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 2001",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 3000",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 3001",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 7000",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL BPC 7001",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC 1000",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC12 1000",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC15 1000",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC15 3000",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC15 7000",
"product_id": "CSAFPID-31019"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC17 1000",
"product_id": "CSAFPID-31020"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC17 3000",
"product_id": "CSAFPID-31021"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC17 7000",
"product_id": "CSAFPID-31022"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL PPC 7000",
"product_id": "CSAFPID-31023"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL RACKMOUNT 2U",
"product_id": "CSAFPID-31024"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11024"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on BL RACKMOUNT 4U",
"product_id": "CSAFPID-31025"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11025"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on DL PPC15 1000",
"product_id": "CSAFPID-31026"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11026"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on DL PPC15M 7000",
"product_id": "CSAFPID-31027"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11027"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on DL PPC18.5M 7000",
"product_id": "CSAFPID-31028"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11028"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on DL PPC21.5M 7000",
"product_id": "CSAFPID-31029"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11029"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on EL PPC 1000",
"product_id": "CSAFPID-31030"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11030"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on EL PPC 1000/M",
"product_id": "CSAFPID-31031"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11031"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on EL PPC 1000/WT",
"product_id": "CSAFPID-31032"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11032"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on TP 3000",
"product_id": "CSAFPID-31033"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11033"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on TP 3000/P",
"product_id": "CSAFPID-31034"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11034"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on TP 3000/WT",
"product_id": "CSAFPID-31035"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11035"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on TPM 3000",
"product_id": "CSAFPID-31036"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11036"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VALUELINE IPC",
"product_id": "CSAFPID-31037"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11037"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 BPC 1000",
"product_id": "CSAFPID-31038"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11038"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 BPC 2000",
"product_id": "CSAFPID-31039"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11039"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 BPC 3000",
"product_id": "CSAFPID-31040"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11040"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 BPC 7000",
"product_id": "CSAFPID-31041"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11041"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 BPC 9000",
"product_id": "CSAFPID-31042"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11042"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC 1000",
"product_id": "CSAFPID-31043"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11043"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC12 1000",
"product_id": "CSAFPID-31044"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11044"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC 2000",
"product_id": "CSAFPID-31045"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11045"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC 3000",
"product_id": "CSAFPID-31046"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11046"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC 7000",
"product_id": "CSAFPID-31047"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11047"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC7 1000",
"product_id": "CSAFPID-31048"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11048"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC 9000",
"product_id": "CSAFPID-31049"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11049"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL2 PPC9 1000",
"product_id": "CSAFPID-31050"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11050"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL BPC 1000",
"product_id": "CSAFPID-31051"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11051"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL BPC 2000",
"product_id": "CSAFPID-31052"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11052"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL BPC 3000",
"product_id": "CSAFPID-31053"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11053"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL IPC P7000",
"product_id": "CSAFPID-31054"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11054"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL PPC 2000",
"product_id": "CSAFPID-31055"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11055"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on VL PPC 3000",
"product_id": "CSAFPID-31056"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11056"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on WP 3000",
"product_id": "CSAFPID-31057"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11057"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5753",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "On Industrial PCs and HMIs that operate with user installable or upgradable operating systems (mainly Windows) the latest version or update may be installed if required in the use case. As the update may have a performance impact, the application should be tested accordingly.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030",
"CSAFPID-31031",
"CSAFPID-31032",
"CSAFPID-31033",
"CSAFPID-31034",
"CSAFPID-31035",
"CSAFPID-31036",
"CSAFPID-31037",
"CSAFPID-31038",
"CSAFPID-31039",
"CSAFPID-31040",
"CSAFPID-31041",
"CSAFPID-31042",
"CSAFPID-31043",
"CSAFPID-31044",
"CSAFPID-31045",
"CSAFPID-31046",
"CSAFPID-31047",
"CSAFPID-31048",
"CSAFPID-31049",
"CSAFPID-31050",
"CSAFPID-31051",
"CSAFPID-31052",
"CSAFPID-31053",
"CSAFPID-31054",
"CSAFPID-31055",
"CSAFPID-31056",
"CSAFPID-31057"
]
}
],
"title": "CVE-2017-5715"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…