Vulnerabilites related to Siemens - OZW672
cve-2019-13941
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf | x_refsource_MISC | |
https://www.us-cert.gov/ics/advisories/icsa-20-042-09 | x_refsource_MISC |
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Siemens AG | OZW672 |
Version: All versions < V10.00 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:05:43.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V10.00" } ] }, { "product": "OZW772", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V10.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-10T19:16:14", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-13941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672", "version": { "version_data": [ { "version_value": "All versions \u003c V10.00" } ] } }, { "product_name": "OZW772", "version": { "version_data": [ { "version_value": "All versions \u003c V10.00" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-552: Files or Directories Accessible to External Parties" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-13941", "datePublished": "2020-02-11T15:36:10", "dateReserved": "2019-07-18T00:00:00", "dateUpdated": "2024-08-05T00:05:43.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6872
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99473 | vdb-entry, x_refsource_BID | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | OZW672, OZW772 |
Version: OZW672, OZW772 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672, OZW772", "vendor": "n/a", "versions": [ { "status": "affected", "version": "OZW672, OZW772" } ] } ], "datePublic": "2017-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2017-6872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672, OZW772", "version": { "version_data": [ { "version_value": "OZW672, OZW772" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "99473", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99473" }, { "name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf", "refsource": "CONFIRM", "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2017-6872", "datePublished": "2017-08-08T00:00:00", "dateReserved": "2017-03-13T00:00:00", "dateUpdated": "2024-08-05T15:41:17.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6873
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99473 | vdb-entry, x_refsource_BID | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | OZW672, OZW772 |
Version: OZW672, OZW772 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OZW672, OZW772", "vendor": "n/a", "versions": [ { "status": "affected", "version": "OZW672, OZW772" } ] } ], "datePublic": "2017-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "99473", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99473" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2017-6873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OZW672, OZW772", "version": { "version_data": [ { "version_value": "OZW672, OZW772" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "99473", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99473" }, { "name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf", "refsource": "CONFIRM", "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2017-6873", "datePublished": "2017-08-08T00:00:00", "dateReserved": "2017-03-13T00:00:00", "dateUpdated": "2024-08-05T15:41:17.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1488
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01 | x_refsource_MISC | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-01-30T11:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1488", "datePublished": "2016-01-30T11:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36140
Vulnerability from cvelistv5
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ozw672", "vendor": "siemens", "versions": [ { "lessThan": "v5.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ozw772", "vendor": "siemens", "versions": [ { "lessThan": "v5.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:33:05.874776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:35:44.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "OZW672", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "OZW772", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:49:32.130Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-36140", "datePublished": "2024-11-12T12:49:32.130Z", "dateReserved": "2024-05-21T11:44:14.682Z", "dateUpdated": "2024-11-12T14:35:44.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf | Vendor Advisory | |
productcert@siemens.com | https://www.us-cert.gov/ics/advisories/icsa-20-042-09 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-042-09 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
siemens | ozw672_firmware | * | |
siemens | ozw672 | - | |
siemens | ozw772_firmware | * | |
siemens | ozw772 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFD10BFF-BF2A-45DA-AF54-274A770D3C6C", "versionEndExcluding": "10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA47579-4868-4B8E-BC4C-3A3280E9FC5D", "versionEndExcluding": "10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en OZW672 (Todas las versiones anteriores a V10.00), OZW772 (Todas las versiones anteriores a V10.00). Las versiones vulnerables de OZW Web Server utilizan nombres de ruta predecibles para archivos de proyecto que los usuarios autenticados leg\u00edtimamente han creado usando la funci\u00f3n de exportaci\u00f3n de la aplicaci\u00f3n. Mediante el acceso a un localizador de recursos uniforme espec\u00edfico en el servidor web, un atacante remoto podr\u00eda descargar un archivo de proyecto sin una autenticaci\u00f3n previa. La vulnerabilidad de seguridad podr\u00eda ser explotada por parte de un atacante no autenticado con acceso de red al sistema afectado. No es requerida una interacci\u00f3n del usuario para explotar esta vulnerabilidad de seguridad. Una explotaci\u00f3n con \u00e9xito de la vulnerabilidad de seguridad compromete la confidencialidad del sistema objetivo." } ], "id": "CVE-2019-13941", "lastModified": "2024-11-21T04:25:44.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-11T16:15:14.897", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-230445.html | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | ozw672_firmware | * | |
siemens | ozw672 | - | |
siemens | ozw772_firmware | * | |
siemens | ozw772 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79643F49-38EC-4BC7-9EB4-6586505B6D76", "versionEndExcluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D46204-8631-4874-98E4-112595A1BDEB", "versionEndExcluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en OZW672 (todas las versiones anteriores a la V5.2) y OZW772 (todas las versiones anteriores a la V5.2). La pesta\u00f1a de cuentas de usuario de los dispositivos afectados es vulnerable a ataques de Cross Site Scripting (XSS) almacenado. Esto podr\u00eda permitir que un atacante remoto autenticado inyecte c\u00f3digo JavaScript arbitrario que luego ejecuta otro usuario v\u00edctima autenticado con posibles privilegios superiores a los del atacante." } ], "id": "CVE-2024-36140", "lastModified": "2024-11-15T22:53:26.063", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "automatable": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "recovery": "NOT_DEFINED", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnerabilityResponseEffort": "NOT_DEFINED", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "HIGH" }, "source": "productcert@siemens.com", "type": "Secondary" } ] }, "published": "2024-11-12T13:15:07.957", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "productcert@siemens.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | http://www.securityfocus.com/bid/99473 | Third Party Advisory, VDB Entry | |
productcert@siemens.com | https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99473 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | ozw772_firmware | - | |
siemens | ozw772 | - | |
siemens | ozw672_firmware | - | |
siemens | ozw672 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw772_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD525AE-EFE3-45DA-A282-40509B4EEFB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw672_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "917679B1-91CD-4A63-A336-85EED243837A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device." }, { "lang": "es", "value": "Se ha descubierto una vulnerabilidad en Siemens OZW672 (todas las versiones) y OZW772 (todas las versiones) que podr\u00eda permitir que un atacante con acceso al puerto 21/tcp accediese o alterase el hist\u00f3rico de datos de medici\u00f3n guardado en el dispositivo." } ], "id": "CVE-2017-6872", "lastModified": "2024-11-21T03:30:42.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-08T00:29:00.290", "references": [ { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99473" }, { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | http://www.securityfocus.com/bid/99473 | Third Party Advisory, VDB Entry | |
productcert@siemens.com | https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99473 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | ozw772_firmware | - | |
siemens | ozw772 | - | |
siemens | ozw672_firmware | - | |
siemens | ozw672 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw772_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD525AE-EFE3-45DA-A282-40509B4EEFB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw672_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "917679B1-91CD-4A63-A336-85EED243837A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp." }, { "lang": "es", "value": "Se ha descubierto una vulnerabilidad en Siemens OZW672 (todas las versiones) y OZW772 (todas las versiones) que podr\u00eda permitir que un atacante leyese y manipulase datos en una sesi\u00f3n TLS mientras realiza un ataque Man-in-the-Middle (MitM) en el servidor web integrado en el puerto 443/tcp." } ], "id": "CVE-2017-6873", "lastModified": "2024-11-21T03:30:42.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-08T00:29:00.320", "references": [ { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99473" }, { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf | Vendor Advisory | |
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
siemens | ozw672 | - | |
siemens | ozw672_firmware | * | |
siemens | ozw772 | - | |
siemens | ozw772_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7334FDED-A93B-49F4-9FA6-3407DBCC336E", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E55E919-90FC-46F8-92F0-20876D392646", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el formulario de inicio de sesi\u00f3n en el servidor web integrado en dispositivos Siemens OZW OZW672 en versiones anteriores a 6.00 y OZW772 en versiones anteriores a 6.00 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada." } ], "id": "CVE-2016-1488", "lastModified": "2024-11-21T02:46:32.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-30T12:59:03.103", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-019-01" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201601-0459
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. A cross-site scripting vulnerability exists in the Siemens OZW672 and OZW772 devices. The vulnerability could be exploited by a remote attacker to change data and settings. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0459", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.2" }, { "model": "ozw672", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.2" }, { "model": "ozw672", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "6.00" }, { "model": "ozw772", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "6.00" }, { "model": "ozw672", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": "*" } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:siemens:ozw672", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:ozw772", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001549" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aditya Sood", "sources": [ { "db": "BID", "id": "80915" } ], "trust": 0.3 }, "cve": "CVE-2016-1488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2016-1488", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2016-00391", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "62b00c84-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-90307", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2016-1488", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1488", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-1488", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-00391", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201601-367", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90307", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. A cross-site scripting vulnerability exists in the Siemens OZW672 and OZW772 devices. The vulnerability could be exploited by a remote attacker to change data and settings. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks", "sources": [ { "db": "NVD", "id": "CVE-2016-1488" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "BID", "id": "80915" }, { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-90307" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1488", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-019-01", "trust": 3.1 }, { "db": "SIEMENS", "id": "SSA-743465", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201601-367", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-00391", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-001549", "trust": 0.8 }, { "db": "BID", "id": "80915", "trust": 0.4 }, { "db": "IVD", "id": "62B00C84-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-90307", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "id": "VAR-201601-0459", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" } ] }, "last_update_date": "2024-11-23T23:02:38.773000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-743465", "trust": 0.8, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "title": "Patch for SiemensOZW672 and OZW772 cross-site scripting vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/70337" }, { "title": "Siemens OZW672 and OZW772 Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59685" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90307" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-019-01" }, { "trust": 1.7, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-743465.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1488" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1488" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "VULHUB", "id": "VHN-90307" }, { "db": "BID", "id": "80915" }, { "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "db": "CNNVD", "id": "CNNVD-201601-367" }, { "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-21T00:00:00", "db": "IVD", "id": "62b00c84-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-00391" }, { "date": "2016-01-30T00:00:00", "db": "VULHUB", "id": "VHN-90307" }, { "date": "2016-01-15T00:00:00", "db": "BID", "id": "80915" }, { "date": "2016-03-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "date": "2016-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-367" }, { "date": "2016-01-30T12:59:03.103000", "db": "NVD", "id": "CVE-2016-1488" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-00391" }, { "date": "2016-03-04T00:00:00", "db": "VULHUB", "id": "VHN-90307" }, { "date": "2016-02-11T07:36:00", "db": "BID", "id": "80915" }, { "date": "2016-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001549" }, { "date": "2016-02-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-367" }, { "date": "2024-11-21T02:46:32.177000", "db": "NVD", "id": "CVE-2016-1488" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-00391" }, { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-367" } ], "trust": 0.6 } }
var-202002-1475
Vulnerability from variot
A vulnerability has been identified in OZW672 (All versions < V10.00), OZW772 (All versions < V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application's export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. OZW672 and OZW772 Contains vulnerabilities in externally accessible files or directories.Information may be obtained. Siemens OZW672 and OZW772 are the building controller products of Germany's Siemens
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-1475", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "10.00" }, { "model": "ozw772", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "10.00" }, { "model": "ozw672", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v10.00" }, { "model": "ozw772", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v10.00" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": "*" } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" } ] }, "cve": "CVE-2019-13941", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-13941", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-014548", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-15262", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-13941", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2019-014548", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13941", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2019-014548", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-15262", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202002-454", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in OZW672 (All versions \u003c V10.00), OZW772 (All versions \u003c V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application\u0027s export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. OZW672 and OZW772 Contains vulnerabilities in externally accessible files or directories.Information may be obtained. Siemens OZW672 and OZW772 are the building controller products of Germany\u0027s Siemens", "sources": [ { "db": "NVD", "id": "CVE-2019-13941" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13941", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-042-09", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-986695", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2020-15262", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-454", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014548", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0486", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0486.3", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0486.2", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-06", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-07", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-10", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-02", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-05", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-08", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-04", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-03", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-20-042-01", "trust": 0.6 }, { "db": "IVD", "id": "9D70A0CB-14C2-49AD-8202-3AE7B396C3AD", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "id": "VAR-202002-1475", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" } ], "trust": 1.425 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" } ] }, "last_update_date": "2024-11-23T21:21:04.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-986695", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "title": "Patch for Siemens OZW672 and OZW772 Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/206793" }, { "title": "Siemens OZW672 and OZW772 Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110189" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-552", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-09" }, { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-986695.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13941" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13941" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-10" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-08" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-07" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-06" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-05" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-04" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-03" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-02" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-042-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0486.3/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "db": "CNVD", "id": "CNVD-2020-15262" }, { "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "db": "CNNVD", "id": "CNNVD-202002-454" }, { "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-11T00:00:00", "db": "IVD", "id": "9d70a0cb-14c2-49ad-8202-3ae7b396c3ad" }, { "date": "2020-03-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-15262" }, { "date": "2020-02-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-454" }, { "date": "2020-02-11T16:15:14.897000", "db": "NVD", "id": "CVE-2019-13941" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-15262" }, { "date": "2020-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014548" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-454" }, { "date": "2024-11-21T04:25:44.447000", "db": "NVD", "id": "CVE-2019-13941" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-454" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OZW672 and OZW772 Vulnerability in externally accessible files or directories in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-454" } ], "trust": 0.6 } }
var-202411-0737
Vulnerability from variot
A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.
This could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens' OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning.
Siemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0737", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw672", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2" }, { "model": "ozw772", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2" }, { "model": "ozw772", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ozw672", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "cve": "CVE-2024-36140", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2024-45220", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2024-36140", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.3, "id": "CVE-2024-36140", "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2024-36140", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-36140", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-36140", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-36140", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-45220", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks. \r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens\u0027 OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning. \n\nSiemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code", "sources": [ { "db": "NVD", "id": "CVE-2024-36140" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "CNVD", "id": "CNVD-2024-45220" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-36140", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-230445", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-03", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012845", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-45220", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "id": "VAR-202411-0737", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ], "trust": 1.225 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ] }, "last_update_date": "2024-11-28T20:10:13.609000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens OZW devices (web servers) cross-site scripting vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617291" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-36140" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-03" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-45220" }, { "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45220" }, { "date": "2024-11-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "date": "2024-11-12T13:15:07.957000", "db": "NVD", "id": "CVE-2024-36140" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45220" }, { "date": "2024-11-18T04:46:00", "db": "JVNDB", "id": "JVNDB-2024-012845" }, { "date": "2024-11-15T22:53:26.063000", "db": "NVD", "id": "CVE-2024-36140" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens\u0027 \u00a0OZW672\u00a0 firmware and \u00a0OZW772\u00a0 Cross-site scripting vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012845" } ], "trust": 0.8 } }
var-201708-1510
Vulnerability from variot
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. Siemens OZW672 and OZW772 Contains a cryptographic vulnerability.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There is a man-in-the-middle attack vulnerability in Siemens OZW672 and OZW772. Multiple Siemens OZW672 and OZW772 are prone to multiple authentication-bypass vulnerabilities. An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1510", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw672", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ozw672", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": null } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006993" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck from SEC Consult.", "sources": [ { "db": "BID", "id": "99473" } ], "trust": 0.3 }, "cve": "CVE-2017-6873", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-6873", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2017-12866", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-115076", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2017-6873", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6873", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-6873", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-12866", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201703-624", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-115076", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-6873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. Siemens OZW672 and OZW772 Contains a cryptographic vulnerability.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There is a man-in-the-middle attack vulnerability in Siemens OZW672 and OZW772. Multiple Siemens OZW672 and OZW772 are prone to multiple authentication-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2017-6873" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "BID", "id": "99473" }, { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6873", "trust": 3.7 }, { "db": "SIEMENS", "id": "SSA-563539", "trust": 2.7 }, { "db": "BID", "id": "99473", "trust": 2.1 }, { "db": "ICS CERT", "id": "ICSA-17-187-01", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-201703-624", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-12866", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-006993", "trust": 0.8 }, { "db": "IVD", "id": "B6AAB7B7-CD78-4139-9B22-D94F00E179D1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-115076", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-6873", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "id": "VAR-201708-1510", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" } ] }, "last_update_date": "2024-11-23T21:40:29.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-563539", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "title": "Patch for Siemens OZW672 and OZW772 man-in-the-middle attack vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/97345" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115076" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/99473" }, { "trust": 1.2, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-187-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6873" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6873" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "db": "CNVD", "id": "CNVD-2017-12866" }, { "db": "VULHUB", "id": "VHN-115076" }, { "db": "VULMON", "id": "CVE-2017-6873" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "db": "CNNVD", "id": "CNNVD-201703-624" }, { "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "IVD", "id": "b6aab7b7-cd78-4139-9b22-d94f00e179d1" }, { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12866" }, { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-115076" }, { "date": "2017-08-08T00:00:00", "db": "VULMON", "id": "CVE-2017-6873" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "date": "2017-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-624" }, { "date": "2017-08-08T00:29:00.320000", "db": "NVD", "id": "CVE-2017-6873" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12866" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-115076" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2017-6873" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006993" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-624" }, { "date": "2024-11-21T03:30:42.440000", "db": "NVD", "id": "CVE-2017-6873" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-624" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Cryptographic vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006993" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-624" } ], "trust": 0.6 } }
var-201708-1509
Vulnerability from variot
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device. Siemens OZW672 and OZW772 Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There are data read and write vulnerabilities in Siemens OZW672 and OZW772. An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. A security vulnerability exists in Siemens OZW672 and OZW772 devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1509", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ozw772", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw672", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "ozw772", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ozw672", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw772", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ozw672", "version": null } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ozw672_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ozw772_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007020" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck from SEC Consult.", "sources": [ { "db": "BID", "id": "99473" } ], "trust": 0.3 }, "cve": "CVE-2017-6872", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-6872", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-12867", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7002627a-a56c-43fd-b57e-9336b0866e9e", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-115075", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2017-6872", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6872", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-6872", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-12867", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201703-625", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-115075", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device. Siemens OZW672 and OZW772 Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. Both Siemens OZW672 and OZW772 are building controller products from Siemens AG. There are data read and write vulnerabilities in Siemens OZW672 and OZW772. \nAn attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. A security vulnerability exists in Siemens OZW672 and OZW772 devices", "sources": [ { "db": "NVD", "id": "CVE-2017-6872" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "BID", "id": "99473" }, { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "VULHUB", "id": "VHN-115075" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6872", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-563539", "trust": 2.6 }, { "db": "BID", "id": "99473", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201703-625", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-12867", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-007020", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-187-01", "trust": 0.3 }, { "db": "IVD", "id": "7002627A-A56C-43FD-B57E-9336B0866E9E", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-115075", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "id": "VAR-201708-1509", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" } ], "trust": 1.525 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" } ] }, "last_update_date": "2024-11-23T21:40:29.796000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-563539", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "title": "Patch for SiemensOZW672 and OZW772 data read and write vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/97346" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115075" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/99473" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6872" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6872" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-187-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "db": "CNVD", "id": "CNVD-2017-12867" }, { "db": "VULHUB", "id": "VHN-115075" }, { "db": "BID", "id": "99473" }, { "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "db": "CNNVD", "id": "CNNVD-201703-625" }, { "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "IVD", "id": "7002627a-a56c-43fd-b57e-9336b0866e9e" }, { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12867" }, { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-115075" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "date": "2017-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-625" }, { "date": "2017-08-08T00:29:00.290000", "db": "NVD", "id": "CVE-2017-6872" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-12867" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-115075" }, { "date": "2017-07-06T00:00:00", "db": "BID", "id": "99473" }, { "date": "2017-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007020" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-625" }, { "date": "2024-11-21T03:30:42.320000", "db": "NVD", "id": "CVE-2017-6872" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-625" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens OZW672 and OZW772 Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-625" } ], "trust": 0.6 } }