Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-45464 (GCVE-0-2024-45464)
Vulnerability from cvelistv5 – Published: 2024-10-08 08:40 – Updated: 2024-12-10 13:53
VLAI?
EPSS
Summary
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
Severity ?
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Siemens | Teamcenter Visualization V14.2 |
Affected:
0 , < V14.2.0.14
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "tecnomatix_plant_simulation",
"vendor": "siemens",
"versions": [
{
"lessThan": "2302.0016",
"status": "affected",
"version": "2302.0",
"versionType": "custom"
},
{
"lessThan": "2404.0005",
"status": "affected",
"version": "2404.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-45464",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T17:56:24.994180Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T17:57:16.357Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Teamcenter Visualization V14.2",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V14.2.0.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Teamcenter Visualization V14.3",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V14.3.0.12",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Teamcenter Visualization V2312",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V2312.0008",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Tecnomatix Plant Simulation V2302",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V2302.0016",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "Tecnomatix Plant Simulation V2404",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V2404.0005",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV4_0": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125: Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T13:53:33.725Z",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2024-45464",
"datePublished": "2024-10-08T08:40:22.016Z",
"dateReserved": "2024-08-29T11:28:48.105Z",
"dateUpdated": "2024-12-10T13:53:33.725Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-45464",
"date": "2026-05-10",
"epss": "0.00176",
"percentile": "0.38595"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2302.0016\", \"matchCriteriaId\": \"00AE6AA5-618F-4494-B8D6-2AC25A5DC2F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2303.0000\", \"versionEndExcluding\": \"2404.0005\", \"matchCriteriaId\": \"E84CE123-587E-480C-A6C8-AF7B4AE3ACF2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.\"}, {\"lang\": \"es\", \"value\": \"Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\\u00edmites m\\u00e1s all\\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\\u00eda permitir que un atacante ejecute c\\u00f3digo en el contexto del proceso actual.\"}]",
"id": "CVE-2024-45464",
"lastModified": "2024-12-10T14:30:41.117",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"productcert@siemens.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"PASSIVE\", \"vulnerableSystemConfidentiality\": \"HIGH\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"HIGH\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}], \"cvssMetricV31\": [{\"source\": \"productcert@siemens.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2024-10-08T09:15:12.370",
"references": "[{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-583523.html\", \"source\": \"productcert@siemens.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-645131.html\", \"source\": \"productcert@siemens.com\"}]",
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"productcert@siemens.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-45464\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2024-10-08T09:15:12.370\",\"lastModified\":\"2024-12-10T14:30:41.117\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2302.0016\",\"matchCriteriaId\":\"00AE6AA5-618F-4494-B8D6-2AC25A5DC2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2303.0000\",\"versionEndExcluding\":\"2404.0005\",\"matchCriteriaId\":\"E84CE123-587E-480C-A6C8-AF7B4AE3ACF2\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-583523.html\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-645131.html\",\"source\":\"productcert@siemens.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45464\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-08T17:56:24.994180Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*\"], \"vendor\": \"siemens\", \"product\": \"tecnomatix_plant_simulation\", \"versions\": [{\"status\": \"affected\", \"version\": \"2302.0\", \"lessThan\": \"2302.0016\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2404.0\", \"lessThan\": \"2404.0005\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-08T17:57:11.950Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}}, {\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\"}}], \"affected\": [{\"vendor\": \"Siemens\", \"product\": \"Teamcenter Visualization V14.2\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V14.2.0.14\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"Teamcenter Visualization V14.3\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V14.3.0.12\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"Teamcenter Visualization V2312\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V2312.0008\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"Tecnomatix Plant Simulation V2302\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V2302.0016\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"Tecnomatix Plant Simulation V2404\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V2404.0005\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-583523.html\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-645131.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125: Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"shortName\": \"siemens\", \"dateUpdated\": \"2024-12-10T13:53:33.725Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-45464\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-10T13:53:33.725Z\", \"dateReserved\": \"2024-08-29T11:28:48.105Z\", \"assignerOrgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"datePublished\": \"2024-10-08T08:40:22.016Z\", \"assignerShortName\": \"siemens\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ICSA-24-284-13
Vulnerability from csaf_cisa - Published: 2024-10-08 00:00 - Updated: 2025-05-06 06:00Summary
Siemens Tecnomatix Plant Simulation
Notes
Summary: Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice: All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer: This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors: Energy
Countries/areas deployed: Worldwide
Company headquarters location: Germany
Recommended Practices: CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices: Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices: Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CWE-476
- NULL Pointer Dereference
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
References
Acknowledgments
ADLab of Venustech
Jin Huang
Trend Micro Zero Day Initiative
{
"document": {
"acknowledgments": [
{
"names": [
"Jin Huang"
],
"organization": "ADLab of Venustech",
"summary": "reporting these vulnerabilities to Siemens."
},
{
"organization": "Trend Micro Zero Day Initiative",
"summary": "reporting these vulnerabilities to Siemens."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-583523.json"
},
{
"category": "self",
"summary": "SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-284-13 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-284-13.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-284-13 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-13"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Tecnomatix Plant Simulation",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-284-13",
"initial_release_date": "2024-10-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-10-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2024-53041 and CVE-2024-53242"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "3",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2302.0016",
"product": {
"name": "Tecnomatix Plant Simulation V2302",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2302"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2404.0005",
"product": {
"name": "Tecnomatix Plant Simulation V2404",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2404"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a null pointer dereference vulnerability while parsing specially crafted WRL files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-53041",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-53041"
},
{
"cve": "CVE-2024-53242",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2024-53242"
}
]
}
ICSA-24-347-09
Vulnerability from csaf_cisa - Published: 2024-12-10 00:00 - Updated: 2025-05-06 06:00Summary
Siemens Teamcenter Visualization
Notes
Summary: Siemens Teamcenter Visualization contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice: All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer: This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors: Critical Manufacturing
Countries/areas deployed: Worldwide
Company headquarters location: Germany
Recommended Practices: CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices: Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices: Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CWE-476
- NULL Pointer Dereference
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
CSAFPID-0004
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
CSAFPID-0001
CSAFPID-0002
CSAFPID-0003
References
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
Acknowledgments
Siemens
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Siemens Teamcenter Visualization contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-645131.json"
},
{
"category": "self",
"summary": "SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-347-09 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-347-09.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-347-09 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-09"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Teamcenter Visualization\u00a0",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-347-09",
"initial_release_date": "2024-12-10T00:00:00.000000Z",
"revision_history": [
{
"date": "2024-12-10T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.2.0.14",
"product": {
"name": "Teamcenter Visualization V14.2",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V14.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV14.3.0.12",
"product": {
"name": "Teamcenter Visualization V14.3",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V14.3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2312.0008",
"product": {
"name": "Teamcenter Visualization V2312",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2312"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2406.0005",
"product": {
"name": "Teamcenter Visualization V2406",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2406"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a null pointer dereference vulnerability while parsing specially crafted WRL files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-52565",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24231)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52565"
},
{
"cve": "CVE-2024-52566",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24233)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52566"
},
{
"cve": "CVE-2024-52567",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24237)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52567"
},
{
"cve": "CVE-2024-52568",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files.\r\nAn attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-24244)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52568"
},
{
"cve": "CVE-2024-52569",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24260)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52569"
},
{
"cve": "CVE-2024-52570",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24365)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52570"
},
{
"cve": "CVE-2024-52571",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24485)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52571"
},
{
"cve": "CVE-2024-52572",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24486)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52572"
},
{
"cve": "CVE-2024-52573",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24521)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52573"
},
{
"cve": "CVE-2024-52574",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24543)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"title": "CVE-2024-52574"
},
{
"cve": "CVE-2024-53041",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-53041"
},
{
"cve": "CVE-2024-53242",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"CSAFPID-0003"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003"
]
}
],
"title": "CVE-2024-53242"
}
]
}
CNVD-2024-40024
Vulnerability from cnvd - Published: 2024-10-10
VLAI Severity ?
Title
Siemens Tecnomatix Plant Simulation越界读取漏洞(CNVD-2024-40024)
Description
Tecnomatix Plant Simulation允许对物流系统及其流程进行建模、模拟、探索和优化。这些模型可以在生产执行之前对从全球生产设施到当地工厂和特定生产线的所有制造计划进行物料流、资源利用和物流分析。
Siemens Tecnomatix Plant Simulation存在越界读取漏洞,攻击者可利用该漏洞在当前进程的上下文中执行代码。
Severity
高
Patch Name
Siemens Tecnomatix Plant Simulation越界读取漏洞(CNVD-2024-40024)的补丁
Patch Description
Tecnomatix Plant Simulation允许对物流系统及其流程进行建模、模拟、探索和优化。这些模型可以在生产执行之前对从全球生产设施到当地工厂和特定生产线的所有制造计划进行物料流、资源利用和物流分析。
Siemens Tecnomatix Plant Simulation存在越界读取漏洞,攻击者可利用该漏洞在当前进程的上下文中执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://support.sw.siemens.com/product/297028302/ https://support.sw.siemens.com/product/297028302/
Reference
https://cert-portal.siemens.com/productcert/html/ssa-583523.html
Impacted products
| Name | ['Siemens Tecnomatix Plant Simulation V2302 <2302.0016', 'Siemens Tecnomatix Plant Simulation V2404 <2404.0005'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-45464"
}
},
"description": "Tecnomatix Plant Simulation\u5141\u8bb8\u5bf9\u7269\u6d41\u7cfb\u7edf\u53ca\u5176\u6d41\u7a0b\u8fdb\u884c\u5efa\u6a21\u3001\u6a21\u62df\u3001\u63a2\u7d22\u548c\u4f18\u5316\u3002\u8fd9\u4e9b\u6a21\u578b\u53ef\u4ee5\u5728\u751f\u4ea7\u6267\u884c\u4e4b\u524d\u5bf9\u4ece\u5168\u7403\u751f\u4ea7\u8bbe\u65bd\u5230\u5f53\u5730\u5de5\u5382\u548c\u7279\u5b9a\u751f\u4ea7\u7ebf\u7684\u6240\u6709\u5236\u9020\u8ba1\u5212\u8fdb\u884c\u7269\u6599\u6d41\u3001\u8d44\u6e90\u5229\u7528\u548c\u7269\u6d41\u5206\u6790\u3002\n\nSiemens Tecnomatix Plant Simulation\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5f53\u524d\u8fdb\u7a0b\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.sw.siemens.com/product/297028302/\r\nhttps://support.sw.siemens.com/product/297028302/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-40024",
"openTime": "2024-10-10",
"patchDescription": "Tecnomatix Plant Simulation\u5141\u8bb8\u5bf9\u7269\u6d41\u7cfb\u7edf\u53ca\u5176\u6d41\u7a0b\u8fdb\u884c\u5efa\u6a21\u3001\u6a21\u62df\u3001\u63a2\u7d22\u548c\u4f18\u5316\u3002\u8fd9\u4e9b\u6a21\u578b\u53ef\u4ee5\u5728\u751f\u4ea7\u6267\u884c\u4e4b\u524d\u5bf9\u4ece\u5168\u7403\u751f\u4ea7\u8bbe\u65bd\u5230\u5f53\u5730\u5de5\u5382\u548c\u7279\u5b9a\u751f\u4ea7\u7ebf\u7684\u6240\u6709\u5236\u9020\u8ba1\u5212\u8fdb\u884c\u7269\u6599\u6d41\u3001\u8d44\u6e90\u5229\u7528\u548c\u7269\u6d41\u5206\u6790\u3002\r\n\r\nSiemens Tecnomatix Plant Simulation\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5f53\u524d\u8fdb\u7a0b\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens Tecnomatix Plant Simulation\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2024-40024\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Siemens Tecnomatix Plant Simulation V2302 \u003c2302.0016",
"Siemens Tecnomatix Plant Simulation V2404 \u003c2404.0005"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html",
"serverity": "\u9ad8",
"submitTime": "2024-10-10",
"title": "Siemens Tecnomatix Plant Simulation\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2024-40024\uff09"
}
NCSC-2024-0473
Vulnerability from csaf_ncscnl - Published: 2024-12-10 19:34 - Updated: 2024-12-10 19:34Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Siemens heeft kwetsbaarheden verholpen in diverse producten als COMOS, RUGGEDCOM, SENTRON, SICAM, SIMATIC en TeamCenter.
Interpretaties: De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Cross-Site-Scripting (XSS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen: Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-191: Integer Underflow (Wrap or Wraparound)
CWE-522: Insufficiently Protected Credentials
CWE-125: Out-of-bounds Read
CWE-352: Cross-Site Request Forgery (CSRF)
CWE-502: Deserialization of Untrusted Data
CWE-611: Improper Restriction of XML External Entity Reference
CWE-122: Heap-based Buffer Overflow
CWE-121: Stack-based Buffer Overflow
CWE-20: Improper Input Validation
CWE-352
- Cross-Site Request Forgery (CSRF)
Product status
Known affected
CSAFPID-1613204
CSAFPID-1613205
CSAFPID-1613206
CSAFPID-1613207
CSAFPID-1613208
CSAFPID-1613209
CSAFPID-1613210
CSAFPID-1613211
CSAFPID-1613212
CSAFPID-1613213
CSAFPID-1613214
CSAFPID-77041
CSAFPID-540801
CSAFPID-77038
CSAFPID-77043
CSAFPID-77042
CSAFPID-77035
CSAFPID-77039
CSAFPID-77037
CSAFPID-77040
CSAFPID-77036
CSAFPID-77034
6.5 (Medium)
Product status
Known affected
CSAFPID-1666785
CSAFPID-1741465
CWE-122
- Heap-based Buffer Overflow
Product status
Known affected
CSAFPID-1478981
CSAFPID-1478982
CSAFPID-1478983
CSAFPID-1504458
CSAFPID-1504457
CSAFPID-1504459
CSAFPID-1703072
CSAFPID-1741172
CSAFPID-1741173
CSAFPID-1741174
CWE-125
- Out-of-bounds Read
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-119
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-119
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-787
- Out-of-bounds Write
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-787
- Out-of-bounds Write
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-119
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-119
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-119
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CWE-476
- NULL Pointer Dereference
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
7.8 (High)
Product status
Known affected
CSAFPID-1478981
CSAFPID-1478982
CSAFPID-1478983
CSAFPID-1504458
CSAFPID-1504457
CSAFPID-1504459
CSAFPID-1703072
CSAFPID-1741172
CSAFPID-1741173
CSAFPID-1741174
CWE-611
- Improper Restriction of XML External Entity Reference
Product status
Known affected
CSAFPID-1702511
CSAFPID-1741068
CSAFPID-1741069
CSAFPID-1741070
CSAFPID-1741071
CSAFPID-1741072
CSAFPID-1741073
CSAFPID-396548
CWE-502
- Deserialization of Untrusted Data
Product status
Known affected
CSAFPID-99097
CSAFPID-75563
CSAFPID-1713199
CSAFPID-1625341
CSAFPID-1713202
CSAFPID-1713204
CSAFPID-1712825
CSAFPID-1712826
CSAFPID-1703190
CSAFPID-1703191
CSAFPID-1500667
CSAFPID-1741175
CSAFPID-1703187
CSAFPID-1703188
CSAFPID-1703189
CSAFPID-1741176
CSAFPID-1703192
CSAFPID-1703193
CSAFPID-1703194
CSAFPID-1741177
CSAFPID-1702687
CSAFPID-1702688
CSAFPID-1703195
CSAFPID-1741178
CSAFPID-1702694
CSAFPID-1703196
CSAFPID-1703197
CSAFPID-1741179
CSAFPID-1703198
CSAFPID-1703199
CSAFPID-1703200
CSAFPID-1741180
CSAFPID-1703201
CSAFPID-1703202
CSAFPID-1703203
CSAFPID-1741181
CSAFPID-1741182
CSAFPID-1741183
CSAFPID-1741184
CSAFPID-1741185
CSAFPID-1741186
CSAFPID-1741187
CSAFPID-1712827
CSAFPID-1712828
CSAFPID-1712829
CSAFPID-1741188
CWE-20
- Improper Input Validation
Product status
Known affected
CSAFPID-99097
CSAFPID-75563
CSAFPID-1713199
CSAFPID-1625341
CSAFPID-1713202
CSAFPID-1713204
CSAFPID-1712826
CSAFPID-1741189
CSAFPID-1703191
CSAFPID-1500667
CSAFPID-1741175
CSAFPID-1703188
CSAFPID-1703189
CSAFPID-1741176
CSAFPID-1637854
CSAFPID-1741190
CSAFPID-1703193
CSAFPID-1703194
CSAFPID-1741177
CSAFPID-1702688
CSAFPID-1703195
CSAFPID-1741178
CSAFPID-1703196
CSAFPID-1703197
CSAFPID-1741179
CSAFPID-1703199
CSAFPID-1703200
CSAFPID-1741180
CSAFPID-1703202
CSAFPID-1703203
CSAFPID-1741181
CSAFPID-1741182
CSAFPID-1741183
CSAFPID-1741184
CSAFPID-1741185
CSAFPID-1741186
CSAFPID-1741187
CSAFPID-1712828
CSAFPID-1712829
CSAFPID-1741188
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-1220770
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-1220770
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1220770
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1220770
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-1220770
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-1220770
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
7.8 (High)
Product status
Known affected
CSAFPID-1637816
CSAFPID-1637817
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
CWE-121
- Stack-based Buffer Overflow
Product status
Known affected
CSAFPID-342619
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1637816
CSAFPID-1637817
CWE-125
- Out-of-bounds Read
Product status
Known affected
CSAFPID-342619
CSAFPID-166120
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1637816
CSAFPID-1637817
4.6 (Medium)
Product status
Known affected
CSAFPID-1478257
CWE-611
- Improper Restriction of XML External Entity Reference
Product status
Known affected
CSAFPID-396548
CSAFPID-1702511
CSAFPID-1741068
CSAFPID-1741069
CSAFPID-1741070
CSAFPID-1741071
CSAFPID-1741072
CSAFPID-1741073
CWE-122
- Heap-based Buffer Overflow
Product status
Known affected
CSAFPID-1680248
CWE-122
- Heap-based Buffer Overflow
Product status
Known affected
CSAFPID-1680248
7.8 (High)
Product status
Known affected
CSAFPID-1680248
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als COMOS, RUGGEDCOM, SENTRON, SICAM, SIMATIC en TeamCenter.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-128393.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-384652.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-392859.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620799.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-645131.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701627.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-730188.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-800126.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-881356.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979056.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-12-10T19:34:53.515240Z",
"id": "NCSC-2024-0473",
"initial_release_date": "2024-12-10T19:34:53.515240Z",
"revision_history": [
{
"date": "2024-12-10T19:34:53.515240Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "comos",
"product": {
"name": "comos",
"product_id": "CSAFPID-396548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.3",
"product": {
"name": "comos_v10.3",
"product_id": "CSAFPID-1702511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.0",
"product": {
"name": "comos_v10.4.0",
"product_id": "CSAFPID-1741068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.1",
"product": {
"name": "comos_v10.4.1",
"product_id": "CSAFPID-1741069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.2",
"product": {
"name": "comos_v10.4.2",
"product_id": "CSAFPID-1741070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.3",
"product": {
"name": "comos_v10.4.3",
"product_id": "CSAFPID-1741071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.4.1",
"product": {
"name": "comos_v10.4.4.1",
"product_id": "CSAFPID-1741073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.4.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "comos_v10.4.4",
"product": {
"name": "comos_v10.4.4",
"product_id": "CSAFPID-1741072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:comos_v10.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1478257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741138",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741139",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741140",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741141",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741142",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741143",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741145",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741146",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741147",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741148",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741149",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741150",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741152",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741154",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741155",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741134",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpci85_central_processing_communication",
"product": {
"name": "cpci85_central_processing_communication",
"product_id": "CSAFPID-1741136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:cpci85_central_processing_communication:05.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000",
"product": {
"name": "ruggedcom_rox_mx5000",
"product_id": "CSAFPID-1613204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_mx5000:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000",
"product": {
"name": "ruggedcom_rox_mx5000",
"product_id": "CSAFPID-1741083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_mx5000:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000re",
"product": {
"name": "ruggedcom_rox_mx5000re",
"product_id": "CSAFPID-1613205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_mx5000re:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000re",
"product": {
"name": "ruggedcom_rox_mx5000re",
"product_id": "CSAFPID-1741084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_mx5000re:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1400",
"product": {
"name": "ruggedcom_rox_rx1400",
"product_id": "CSAFPID-1613206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1400:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1400",
"product": {
"name": "ruggedcom_rox_rx1400",
"product_id": "CSAFPID-1741085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1400:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1500",
"product": {
"name": "ruggedcom_rox_rx1500",
"product_id": "CSAFPID-1613207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1500:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1500",
"product": {
"name": "ruggedcom_rox_rx1500",
"product_id": "CSAFPID-1741086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1500:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1501",
"product": {
"name": "ruggedcom_rox_rx1501",
"product_id": "CSAFPID-1613208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1501:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1501",
"product": {
"name": "ruggedcom_rox_rx1501",
"product_id": "CSAFPID-1741087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1501:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1510",
"product": {
"name": "ruggedcom_rox_rx1510",
"product_id": "CSAFPID-1613209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1510:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1510",
"product": {
"name": "ruggedcom_rox_rx1510",
"product_id": "CSAFPID-1741088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1510:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1511",
"product": {
"name": "ruggedcom_rox_rx1511",
"product_id": "CSAFPID-1613210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1511:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1511",
"product": {
"name": "ruggedcom_rox_rx1511",
"product_id": "CSAFPID-1741089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1511:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1512",
"product": {
"name": "ruggedcom_rox_rx1512",
"product_id": "CSAFPID-1613211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1512:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1512",
"product": {
"name": "ruggedcom_rox_rx1512",
"product_id": "CSAFPID-1741090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1512:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1524",
"product": {
"name": "ruggedcom_rox_rx1524",
"product_id": "CSAFPID-1613212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1524:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1524",
"product": {
"name": "ruggedcom_rox_rx1524",
"product_id": "CSAFPID-1741091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1524:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1536",
"product": {
"name": "ruggedcom_rox_rx1536",
"product_id": "CSAFPID-1613213",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1536:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1536",
"product": {
"name": "ruggedcom_rox_rx1536",
"product_id": "CSAFPID-1741092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx1536:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx5000",
"product": {
"name": "ruggedcom_rox_rx5000",
"product_id": "CSAFPID-1613214",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx5000:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx5000",
"product": {
"name": "ruggedcom_rox_rx5000",
"product_id": "CSAFPID-1741093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rox_rx5000:2.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sentron_powercenter_1000__7kn1110-0mc00_",
"product": {
"name": "sentron_powercenter_1000__7kn1110-0mc00_",
"product_id": "CSAFPID-1666785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sentron_powercenter_1000__7kn1110-0mc00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sentron_powercenter_1100__7kn1111-0mc00_",
"product": {
"name": "sentron_powercenter_1100__7kn1111-0mc00_",
"product_id": "CSAFPID-1741465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sentron_powercenter_1100__7kn1111-0mc00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim",
"product": {
"name": "simatic_s7-plcsim",
"product_id": "CSAFPID-588822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v16",
"product": {
"name": "simatic_s7-plcsim_v16",
"product_id": "CSAFPID-1712825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v17",
"product": {
"name": "simatic_s7-plcsim_v17",
"product_id": "CSAFPID-1712826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v18",
"product": {
"name": "simatic_s7-plcsim_v18",
"product_id": "CSAFPID-1741189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7",
"product": {
"name": "simatic_step_7",
"product_id": "CSAFPID-99097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety",
"product": {
"name": "simatic_step_7_safety",
"product_id": "CSAFPID-1713198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v16",
"product": {
"name": "simatic_step_7_safety_v16",
"product_id": "CSAFPID-1703190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v17",
"product": {
"name": "simatic_step_7_safety_v17",
"product_id": "CSAFPID-1703191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v18",
"product": {
"name": "simatic_step_7_safety_v18",
"product_id": "CSAFPID-1500667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v19",
"product": {
"name": "simatic_step_7_safety_v19",
"product_id": "CSAFPID-1741175",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v16",
"product": {
"name": "simatic_step_7_v16",
"product_id": "CSAFPID-1703187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v17",
"product": {
"name": "simatic_step_7_v17",
"product_id": "CSAFPID-1703188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v18",
"product": {
"name": "simatic_step_7_v18",
"product_id": "CSAFPID-1703189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v19",
"product": {
"name": "simatic_step_7_v19",
"product_id": "CSAFPID-1741176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-75563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified",
"product": {
"name": "simatic_wincc_unified",
"product_id": "CSAFPID-1713199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v19",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v19",
"product_id": "CSAFPID-1741190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v16",
"product": {
"name": "simatic_wincc_unified_v16",
"product_id": "CSAFPID-1703192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v17",
"product": {
"name": "simatic_wincc_unified_v17",
"product_id": "CSAFPID-1703193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v18",
"product": {
"name": "simatic_wincc_unified_v18",
"product_id": "CSAFPID-1703194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v19",
"product": {
"name": "simatic_wincc_unified_v19",
"product_id": "CSAFPID-1741177",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v16",
"product": {
"name": "simatic_wincc_v16",
"product_id": "CSAFPID-1702687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v17",
"product": {
"name": "simatic_wincc_v17",
"product_id": "CSAFPID-1702688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v18",
"product": {
"name": "simatic_wincc_v18",
"product_id": "CSAFPID-1703195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v19",
"product": {
"name": "simatic_wincc_v19",
"product_id": "CSAFPID-1741178",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_femap_v2306",
"product": {
"name": "simcenter_femap_v2306",
"product_id": "CSAFPID-1703072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_femap_v2306:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_femap_v2401",
"product": {
"name": "simcenter_femap_v2401",
"product_id": "CSAFPID-1741172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_femap_v2401:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_femap_v2406",
"product": {
"name": "simcenter_femap_v2406",
"product_id": "CSAFPID-1741173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_femap_v2406:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran",
"product": {
"name": "simcenter_nastran",
"product_id": "CSAFPID-1741174",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran",
"product": {
"name": "simcenter_nastran",
"product_id": "CSAFPID-1676184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran:2306.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran",
"product": {
"name": "simcenter_nastran",
"product_id": "CSAFPID-1676183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran:2312.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran",
"product": {
"name": "simcenter_nastran",
"product_id": "CSAFPID-1676182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran:2406.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran",
"product": {
"name": "simcenter_nastran",
"product_id": "CSAFPID-1741231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran:2406.5000:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2306",
"product": {
"name": "simcenter_nastran_2306",
"product_id": "CSAFPID-1504458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2306:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2306",
"product": {
"name": "simcenter_nastran_2306",
"product_id": "CSAFPID-1478981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2306:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2312",
"product": {
"name": "simcenter_nastran_2312",
"product_id": "CSAFPID-1504457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2312:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2312",
"product": {
"name": "simcenter_nastran_2312",
"product_id": "CSAFPID-1478982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2312:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2406",
"product": {
"name": "simcenter_nastran_2406",
"product_id": "CSAFPID-1504459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2406:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2406",
"product": {
"name": "simcenter_nastran_2406",
"product_id": "CSAFPID-1478983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2406:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es",
"product": {
"name": "simocode_es",
"product_id": "CSAFPID-1713200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v16",
"product": {
"name": "simocode_es_v16",
"product_id": "CSAFPID-1702694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v17",
"product": {
"name": "simocode_es_v17",
"product_id": "CSAFPID-1703196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v18",
"product": {
"name": "simocode_es_v18",
"product_id": "CSAFPID-1703197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v19",
"product": {
"name": "simocode_es_v19",
"product_id": "CSAFPID-1741179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia",
"product": {
"name": "simotion_scout_tia",
"product_id": "CSAFPID-1713201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp1",
"product": {
"name": "simotion_scout_tia_v5.4_sp1",
"product_id": "CSAFPID-1703198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp3",
"product": {
"name": "simotion_scout_tia_v5.4_sp3",
"product_id": "CSAFPID-1703199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.5_sp1",
"product": {
"name": "simotion_scout_tia_v5.5_sp1",
"product_id": "CSAFPID-1703200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.6_sp1",
"product": {
"name": "simotion_scout_tia_v5.6_sp1",
"product_id": "CSAFPID-1741180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.6_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1625341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v16",
"product": {
"name": "sinamics_startdrive_v16",
"product_id": "CSAFPID-1703201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v17",
"product": {
"name": "sinamics_startdrive_v17",
"product_id": "CSAFPID-1703202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v18",
"product": {
"name": "sinamics_startdrive_v18",
"product_id": "CSAFPID-1703203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v19",
"product": {
"name": "sinamics_startdrive_v19",
"product_id": "CSAFPID-1741181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es",
"product": {
"name": "sirius_safety_es",
"product_id": "CSAFPID-1713202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v17__tia_portal_",
"product": {
"name": "sirius_safety_es_v17__tia_portal_",
"product_id": "CSAFPID-1741182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v18__tia_portal_",
"product": {
"name": "sirius_safety_es_v18__tia_portal_",
"product_id": "CSAFPID-1741183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v19__tia_portal_",
"product": {
"name": "sirius_safety_es_v19__tia_portal_",
"product_id": "CSAFPID-1741184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v19__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v17__tia_portal_",
"product": {
"name": "sirius_soft_starter_es_v17__tia_portal_",
"product_id": "CSAFPID-1741185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v18__tia_portal_",
"product": {
"name": "sirius_soft_starter_es_v18__tia_portal_",
"product_id": "CSAFPID-1741186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v19__tia_portal_",
"product": {
"name": "sirius_soft_starter_es_v19__tia_portal_",
"product_id": "CSAFPID-1741187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v19__tia_portal_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1680248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1741081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_10:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1741082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_4:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization",
"product": {
"name": "teamcenter_visualization",
"product_id": "CSAFPID-342619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.2",
"product": {
"name": "teamcenter_visualization_v14.2",
"product_id": "CSAFPID-1615270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.3",
"product": {
"name": "teamcenter_visualization_v14.3",
"product_id": "CSAFPID-1615271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2312",
"product": {
"name": "teamcenter_visualization_v2312",
"product_id": "CSAFPID-1615272",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2312:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2406",
"product": {
"name": "teamcenter_visualization_v2406",
"product_id": "CSAFPID-1666832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2406:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-166120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1220770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1741221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2302.0016:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1727493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2302.0018:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-820358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2302.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1673843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2303.0000:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1676081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2403.0000:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1741220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2404.0005:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1727496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2404.0007:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1643856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:2404.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1727495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:v2302.0018:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation",
"product": {
"name": "tecnomatix_plant_simulation",
"product_id": "CSAFPID-1727494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:v2404.0007:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2302",
"product": {
"name": "tecnomatix_plant_simulation_v2302",
"product_id": "CSAFPID-1637816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2302:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2302",
"product": {
"name": "tecnomatix_plant_simulation_v2302",
"product_id": "CSAFPID-1465025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2302:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2404",
"product": {
"name": "tecnomatix_plant_simulation_v2404",
"product_id": "CSAFPID-1637817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2404:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2404",
"product": {
"name": "tecnomatix_plant_simulation_v2404",
"product_id": "CSAFPID-1476361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2404:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud",
"product": {
"name": "tia_portal_cloud",
"product_id": "CSAFPID-1713204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v16",
"product": {
"name": "tia_portal_cloud_v16",
"product_id": "CSAFPID-1712827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v17",
"product": {
"name": "tia_portal_cloud_v17",
"product_id": "CSAFPID-1712828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v18",
"product": {
"name": "tia_portal_cloud_v18",
"product_id": "CSAFPID-1712829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v19",
"product": {
"name": "tia_portal_cloud_v19",
"product_id": "CSAFPID-1741188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000",
"product": {
"name": "ruggedcom_rox_mx5000",
"product_id": "CSAFPID-77041",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_mx5000re",
"product": {
"name": "ruggedcom_rox_mx5000re",
"product_id": "CSAFPID-540801",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_mx5000re:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1400",
"product": {
"name": "ruggedcom_rox_rx1400",
"product_id": "CSAFPID-77038",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1500",
"product": {
"name": "ruggedcom_rox_rx1500",
"product_id": "CSAFPID-77043",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1501",
"product": {
"name": "ruggedcom_rox_rx1501",
"product_id": "CSAFPID-77042",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1510",
"product": {
"name": "ruggedcom_rox_rx1510",
"product_id": "CSAFPID-77035",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1511",
"product": {
"name": "ruggedcom_rox_rx1511",
"product_id": "CSAFPID-77039",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1512",
"product": {
"name": "ruggedcom_rox_rx1512",
"product_id": "CSAFPID-77037",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1524",
"product": {
"name": "ruggedcom_rox_rx1524",
"product_id": "CSAFPID-77040",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx1536",
"product": {
"name": "ruggedcom_rox_rx1536",
"product_id": "CSAFPID-77036",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rox_rx5000",
"product": {
"name": "ruggedcom_rox_rx5000",
"product_id": "CSAFPID-77034",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28398",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613204",
"CSAFPID-1613205",
"CSAFPID-1613206",
"CSAFPID-1613207",
"CSAFPID-1613208",
"CSAFPID-1613209",
"CSAFPID-1613210",
"CSAFPID-1613211",
"CSAFPID-1613212",
"CSAFPID-1613213",
"CSAFPID-1613214",
"CSAFPID-77041",
"CSAFPID-540801",
"CSAFPID-77038",
"CSAFPID-77043",
"CSAFPID-77042",
"CSAFPID-77035",
"CSAFPID-77039",
"CSAFPID-77037",
"CSAFPID-77040",
"CSAFPID-77036",
"CSAFPID-77034"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-28398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1613204",
"CSAFPID-1613205",
"CSAFPID-1613206",
"CSAFPID-1613207",
"CSAFPID-1613208",
"CSAFPID-1613209",
"CSAFPID-1613210",
"CSAFPID-1613211",
"CSAFPID-1613212",
"CSAFPID-1613213",
"CSAFPID-1613214",
"CSAFPID-77041",
"CSAFPID-540801",
"CSAFPID-77038",
"CSAFPID-77043",
"CSAFPID-77042",
"CSAFPID-77035",
"CSAFPID-77039",
"CSAFPID-77037",
"CSAFPID-77040",
"CSAFPID-77036",
"CSAFPID-77034"
]
}
],
"title": "CVE-2020-28398"
},
{
"cve": "CVE-2024-6657",
"cwe": {
"id": "CWE-821",
"name": "Incorrect Synchronization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Synchronization",
"title": "CWE-821"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666785",
"CSAFPID-1741465"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6657",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6657.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666785",
"CSAFPID-1741465"
]
}
],
"title": "CVE-2024-6657"
},
{
"cve": "CVE-2024-41981",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459",
"CSAFPID-1703072",
"CSAFPID-1741172",
"CSAFPID-1741173",
"CSAFPID-1741174"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41981.json"
}
],
"title": "CVE-2024-41981"
},
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45463.json"
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45467.json"
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45468",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45468.json"
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45469.json"
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45470",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45470.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45471.json"
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45472.json"
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45474.json"
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45475.json"
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-47046",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459",
"CSAFPID-1703072",
"CSAFPID-1741172",
"CSAFPID-1741173",
"CSAFPID-1741174"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459",
"CSAFPID-1703072",
"CSAFPID-1741172",
"CSAFPID-1741173",
"CSAFPID-1741174"
]
}
],
"title": "CVE-2024-47046"
},
{
"cve": "CVE-2024-49704",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702511",
"CSAFPID-1741068",
"CSAFPID-1741069",
"CSAFPID-1741070",
"CSAFPID-1741071",
"CSAFPID-1741072",
"CSAFPID-1741073",
"CSAFPID-396548"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49704",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49704.json"
}
],
"title": "CVE-2024-49704"
},
{
"cve": "CVE-2024-49849",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-99097",
"CSAFPID-75563",
"CSAFPID-1713199",
"CSAFPID-1625341",
"CSAFPID-1713202",
"CSAFPID-1713204",
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1741175",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1741176",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1741177",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1741178",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1741179",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1741180",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1741181",
"CSAFPID-1741182",
"CSAFPID-1741183",
"CSAFPID-1741184",
"CSAFPID-1741185",
"CSAFPID-1741186",
"CSAFPID-1741187",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829",
"CSAFPID-1741188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49849.json"
}
],
"title": "CVE-2024-49849"
},
{
"cve": "CVE-2024-52051",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-99097",
"CSAFPID-75563",
"CSAFPID-1713199",
"CSAFPID-1625341",
"CSAFPID-1713202",
"CSAFPID-1713204",
"CSAFPID-1712826",
"CSAFPID-1741189",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1741175",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1741176",
"CSAFPID-1637854",
"CSAFPID-1741190",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1741177",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1741178",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1741179",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1741180",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1741181",
"CSAFPID-1741182",
"CSAFPID-1741183",
"CSAFPID-1741184",
"CSAFPID-1741185",
"CSAFPID-1741186",
"CSAFPID-1741187",
"CSAFPID-1712828",
"CSAFPID-1712829",
"CSAFPID-1741188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52051",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52051.json"
}
],
"title": "CVE-2024-52051"
},
{
"cve": "CVE-2024-52565",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52565",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52565"
},
{
"cve": "CVE-2024-52566",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52566",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52566"
},
{
"cve": "CVE-2024-52567",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1220770",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1220770",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52567"
},
{
"cve": "CVE-2024-52568",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1220770",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52568",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52568.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1220770",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52568"
},
{
"cve": "CVE-2024-52569",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52569",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52569.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52569"
},
{
"cve": "CVE-2024-52570",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52570",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52570.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-1220770",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52570"
},
{
"cve": "CVE-2024-52571",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52571.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52571"
},
{
"cve": "CVE-2024-52572",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52572"
},
{
"cve": "CVE-2024-52573",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52573"
},
{
"cve": "CVE-2024-52574",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52574",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52574.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1637816",
"CSAFPID-1637817",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832"
]
}
],
"title": "CVE-2024-52574"
},
{
"cve": "CVE-2024-53041",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-342619",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53041",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53041.json"
}
],
"title": "CVE-2024-53041"
},
{
"cve": "CVE-2024-53242",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-342619",
"CSAFPID-166120",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53242.json"
}
],
"title": "CVE-2024-53242"
},
{
"cve": "CVE-2024-53832",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1478257"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53832",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53832.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1478257"
]
}
],
"title": "CVE-2024-53832"
},
{
"cve": "CVE-2024-54005",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-396548",
"CSAFPID-1702511",
"CSAFPID-1741068",
"CSAFPID-1741069",
"CSAFPID-1741070",
"CSAFPID-1741071",
"CSAFPID-1741072",
"CSAFPID-1741073"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54005",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54005.json"
}
],
"title": "CVE-2024-54005"
},
{
"cve": "CVE-2024-54093",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54093",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54093.json"
}
],
"title": "CVE-2024-54093"
},
{
"cve": "CVE-2024-54094",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54094",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54094.json"
}
],
"title": "CVE-2024-54094"
},
{
"cve": "CVE-2024-54095",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54095",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54095.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-54095"
}
]
}
NCSC-2024-0390
Vulnerability from csaf_ncscnl - Published: 2024-10-08 13:49 - Updated: 2024-10-08 13:49Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Siemens heeft kwetsbaarheden verholpen in diverse producten als Questa/ModelSIM, RUGGEDCOM, SENTRON, SIMATIC, SINEC, Tecnomatix en Teamcenter.
Interpretaties: De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen: Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE-312: Cleartext Storage of Sensitive Information
CWE-476: NULL Pointer Dereference
CWE-863: Incorrect Authorization
CWE-121: Stack-based Buffer Overflow
CWE-183: Permissive List of Allowed Inputs
CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-427: Uncontrolled Search Path Element
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CWE-288: Authentication Bypass Using an Alternate Path or Channel
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-125: Out-of-bounds Read
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-787: Out-of-bounds Write
8.6 (High)
Product status
Known affected
CSAFPID-1666785
6.0 (Medium)
Product status
Known affected
CSAFPID-1666783
CSAFPID-1666784
CWE-476
- NULL Pointer Dereference
Product status
Known affected
CSAFPID-1465776
CSAFPID-1465778
CSAFPID-1465779
CSAFPID-1465780
CSAFPID-1666374
CSAFPID-342618
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
CSAFPID-1497083
CSAFPID-1497084
CSAFPID-362091
7.8 (High)
Product status
Known affected
CSAFPID-1465776
CSAFPID-1465778
CSAFPID-1465779
CSAFPID-1465780
CSAFPID-1666374
CSAFPID-342618
CSAFPID-1615270
CSAFPID-1615271
CSAFPID-1615272
CSAFPID-1666832
CSAFPID-1497083
CSAFPID-1497084
CSAFPID-362091
9.8 (Critical)
Product status
Known affected
CSAFPID-1666375
CSAFPID-1666578
7.8 (High)
Product status
Known affected
CSAFPID-1465776
CSAFPID-342618
CWE-122
- Heap-based Buffer Overflow
Product status
Known affected
CSAFPID-1478981
CSAFPID-1478982
CSAFPID-1478983
CSAFPID-1504458
CSAFPID-1504457
CSAFPID-1504459
8.8 (High)
Product status
Known affected
CSAFPID-1666786
6.5 (Medium)
Product status
Known affected
CSAFPID-1666786
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
7.8 (High)
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CWE-476
- NULL Pointer Dereference
Product status
Known affected
CSAFPID-1465025
CSAFPID-1476361
CSAFPID-1637816
CSAFPID-1637817
CWE-601
- URL Redirection to Untrusted Site ('Open Redirect')
Product status
Known affected
CSAFPID-1457899
CSAFPID-1457901
CSAFPID-1457652
CSAFPID-1666376
CSAFPID-1666377
CSAFPID-1666378
CSAFPID-1666379
CSAFPID-1666380
CSAFPID-1666381
CSAFPID-1666382
CSAFPID-1666383
CSAFPID-1666384
CSAFPID-1666385
CSAFPID-1666386
CSAFPID-1666387
CSAFPID-1666388
CSAFPID-1666389
CSAFPID-1666390
CSAFPID-1666391
CSAFPID-1666392
CSAFPID-1666393
CSAFPID-1666394
CSAFPID-1457912
CSAFPID-1457913
CSAFPID-1457914
CSAFPID-1457915
CSAFPID-1457916
CSAFPID-1457917
CSAFPID-1457918
CSAFPID-1457919
CSAFPID-1457920
CSAFPID-1457921
CSAFPID-1457922
CSAFPID-1457923
CSAFPID-1666395
CSAFPID-1666396
CSAFPID-1457924
CSAFPID-1457925
CSAFPID-1457926
CSAFPID-1457927
CSAFPID-1457928
CSAFPID-1457929
CSAFPID-1457930
CSAFPID-1457931
CSAFPID-1457932
CSAFPID-1457933
CSAFPID-1666397
CSAFPID-1666398
CSAFPID-1457934
CSAFPID-1457935
CSAFPID-1457936
CSAFPID-1457937
CSAFPID-1457938
CSAFPID-1457939
CSAFPID-1457940
CSAFPID-1457941
CSAFPID-1457942
CSAFPID-1457943
CSAFPID-1457944
CSAFPID-1457945
CSAFPID-1457946
CSAFPID-1457947
CSAFPID-1457948
CSAFPID-1457949
CSAFPID-1457950
CSAFPID-1457951
CSAFPID-1666399
CSAFPID-1666400
CSAFPID-1666401
CSAFPID-1666402
CSAFPID-1666403
CSAFPID-1666404
CSAFPID-1666405
CSAFPID-1666406
CSAFPID-1666407
CSAFPID-1666408
CSAFPID-1666409
CSAFPID-1666410
CSAFPID-1457954
CSAFPID-1457970
CSAFPID-1457971
CSAFPID-1457972
CSAFPID-1457973
CSAFPID-1457974
CSAFPID-1457975
CSAFPID-1457976
CSAFPID-1457977
CSAFPID-1457978
CSAFPID-1457979
CSAFPID-1457980
CSAFPID-1457981
CSAFPID-1457982
CSAFPID-1457983
CSAFPID-1457984
CSAFPID-1457985
CSAFPID-1457986
CSAFPID-1458007
CSAFPID-1457987
CSAFPID-1457988
CSAFPID-1457989
CSAFPID-1457990
CSAFPID-1457991
CSAFPID-1457992
CSAFPID-1457993
CSAFPID-1457994
CSAFPID-1666526
CSAFPID-1666527
CSAFPID-1666528
CSAFPID-1666529
CSAFPID-1666530
CSAFPID-1666531
CSAFPID-1666532
CSAFPID-1666533
CSAFPID-1666534
CSAFPID-1666535
CSAFPID-1666537
CSAFPID-1666662
CSAFPID-1666663
CSAFPID-1666664
CSAFPID-1666805
CSAFPID-1666806
CSAFPID-1666807
CSAFPID-1666808
CSAFPID-1666809
CSAFPID-1666810
CSAFPID-1666811
CSAFPID-1666812
CSAFPID-1666813
CSAFPID-1666814
CSAFPID-1666815
CSAFPID-1666816
CSAFPID-1666817
CSAFPID-1666818
CSAFPID-1666819
CSAFPID-1666820
CSAFPID-1666821
CSAFPID-1666822
CSAFPID-1666823
CSAFPID-1666665
CSAFPID-1666666
CSAFPID-1666667
CSAFPID-1666668
CSAFPID-1666669
CSAFPID-1666670
CSAFPID-1666671
CSAFPID-1666672
CSAFPID-1666673
CSAFPID-1666674
CSAFPID-1666675
CSAFPID-1666676
CSAFPID-1666677
CSAFPID-1666678
CSAFPID-1666679
CSAFPID-1666680
CSAFPID-1666681
CSAFPID-1666682
CSAFPID-1666683
CSAFPID-1666684
CSAFPID-1666685
CSAFPID-1666686
CSAFPID-1666687
CSAFPID-1666688
CSAFPID-1666689
CSAFPID-1666690
CSAFPID-1666691
CSAFPID-1666692
CSAFPID-1666693
CSAFPID-1666694
CSAFPID-1666695
CSAFPID-1666696
CSAFPID-1666697
CSAFPID-1666698
CSAFPID-1666699
CSAFPID-1666700
CSAFPID-1666701
CSAFPID-1666702
CSAFPID-1666703
CSAFPID-1666704
CSAFPID-1666705
CSAFPID-1666706
CSAFPID-1666707
CSAFPID-1666708
CSAFPID-1666709
CSAFPID-1666710
CSAFPID-1666711
CSAFPID-1666712
CSAFPID-1666713
CSAFPID-1666714
CSAFPID-1666715
CSAFPID-1666716
CSAFPID-1666717
CSAFPID-1666718
CSAFPID-1666719
CSAFPID-1666720
CSAFPID-1666721
CSAFPID-1666722
CSAFPID-1666723
CSAFPID-1666724
CSAFPID-1666725
CSAFPID-1666726
CSAFPID-1615260
CSAFPID-1615261
CSAFPID-1666727
CSAFPID-1615262
CSAFPID-1615263
CSAFPID-1666728
CSAFPID-1666729
CSAFPID-1666730
CSAFPID-1666731
CSAFPID-1666732
CSAFPID-1666733
CSAFPID-1666734
CSAFPID-1666735
CSAFPID-1666824
CSAFPID-710676
CSAFPID-1666736
CSAFPID-1666737
CSAFPID-1666738
CSAFPID-1666739
CSAFPID-1666740
CSAFPID-1666741
CSAFPID-1666742
CSAFPID-1666743
CSAFPID-1666744
CSAFPID-1666745
CSAFPID-1666746
CSAFPID-1666747
CSAFPID-1666748
CSAFPID-1666749
CSAFPID-1666750
CSAFPID-1666751
CSAFPID-1666752
CSAFPID-1666753
CSAFPID-1666754
CSAFPID-1666755
CSAFPID-1666756
CSAFPID-1666757
CSAFPID-1666758
CSAFPID-1666759
CSAFPID-1666760
CSAFPID-1666761
CSAFPID-1666762
CSAFPID-1666763
CSAFPID-1666764
CSAFPID-1666765
CSAFPID-1666766
CSAFPID-1666767
CSAFPID-1666768
CSAFPID-1666769
CSAFPID-1666825
CSAFPID-1666770
CSAFPID-1666771
CSAFPID-1666772
CSAFPID-1666773
CSAFPID-1666774
CSAFPID-1666775
CSAFPID-1666776
CSAFPID-1666777
CSAFPID-1666778
CSAFPID-1666779
CSAFPID-1666780
CSAFPID-1615264
CSAFPID-1666781
CWE-288
- Authentication Bypass Using an Alternate Path or Channel
Product status
Known affected
CSAFPID-1457899
CSAFPID-1457901
CSAFPID-1457652
CSAFPID-1457912
CSAFPID-1457913
CSAFPID-1457914
CSAFPID-1457915
CSAFPID-1457916
CSAFPID-1457917
CSAFPID-1457918
CSAFPID-1457919
CSAFPID-1457920
CSAFPID-1457921
CSAFPID-1457922
CSAFPID-1457923
CSAFPID-1666395
CSAFPID-1666396
CSAFPID-1457924
CSAFPID-1457925
CSAFPID-1457926
CSAFPID-1457927
CSAFPID-1457928
CSAFPID-1457929
CSAFPID-1457930
CSAFPID-1457931
CSAFPID-1457932
CSAFPID-1457933
CSAFPID-1666397
CSAFPID-1666398
CSAFPID-1457934
CSAFPID-1457935
CSAFPID-1457936
CSAFPID-1457937
CSAFPID-1457938
CSAFPID-1457939
CSAFPID-1457940
CSAFPID-1457941
CSAFPID-1457942
CSAFPID-1457943
CSAFPID-1457944
CSAFPID-1457945
CSAFPID-1457946
CSAFPID-1457947
CSAFPID-1457948
CSAFPID-1457949
CSAFPID-1457950
CSAFPID-1457951
CSAFPID-1457952
CSAFPID-1457953
CSAFPID-1457954
CSAFPID-1457970
CSAFPID-1457971
CSAFPID-1457972
CSAFPID-1457973
CSAFPID-1457974
CSAFPID-1457975
CSAFPID-1457976
CSAFPID-1457977
CSAFPID-1457978
CSAFPID-1457979
CSAFPID-1457980
CSAFPID-1457981
CSAFPID-1457982
CSAFPID-1457983
CSAFPID-1457984
CSAFPID-1457985
CSAFPID-1457986
CSAFPID-1457987
CSAFPID-1457988
CSAFPID-1457989
CSAFPID-1457990
CSAFPID-1457991
CSAFPID-1457992
CSAFPID-1457993
CSAFPID-1457994
CSAFPID-1666555
CSAFPID-1666556
CSAFPID-710676
CSAFPID-1666662
CSAFPID-1666663
CSAFPID-1666664
CSAFPID-1666665
CSAFPID-1666666
CSAFPID-1666667
CSAFPID-1666668
CSAFPID-1666669
CSAFPID-1666670
CSAFPID-1666671
CSAFPID-1666672
CSAFPID-1666673
CSAFPID-1666674
CSAFPID-1666675
CSAFPID-1666676
CSAFPID-1666677
CSAFPID-1666678
CSAFPID-1666679
CSAFPID-1666680
CSAFPID-1666681
CSAFPID-1666682
CSAFPID-1666683
CSAFPID-1666684
CSAFPID-1666685
CSAFPID-1666686
CSAFPID-1666687
CSAFPID-1666688
CSAFPID-1666689
CSAFPID-1666690
CSAFPID-1666691
CSAFPID-1666692
CSAFPID-1666693
CSAFPID-1666694
CSAFPID-1666695
CSAFPID-1666696
CSAFPID-1666697
CSAFPID-1666698
CSAFPID-1666699
CSAFPID-1666700
CSAFPID-1666701
CSAFPID-1666702
CSAFPID-1666703
CSAFPID-1666704
CSAFPID-1666705
CSAFPID-1666706
CSAFPID-1666707
CSAFPID-1666708
CSAFPID-1666709
CSAFPID-1666710
CSAFPID-1666711
CSAFPID-1666712
CSAFPID-1666713
CSAFPID-1666714
CSAFPID-1666715
CSAFPID-1666716
CSAFPID-1666717
CSAFPID-1666718
CSAFPID-1666719
CSAFPID-1666720
CSAFPID-1666721
CSAFPID-1666722
CSAFPID-1666723
CSAFPID-1666724
CSAFPID-1666725
CSAFPID-1666726
CSAFPID-1615260
CSAFPID-1615261
CSAFPID-1666727
CSAFPID-1615262
CSAFPID-1615263
CSAFPID-1666728
CSAFPID-1666729
CSAFPID-1666730
CSAFPID-1666731
CSAFPID-1666732
CSAFPID-1666733
CSAFPID-1666734
CSAFPID-1666735
CSAFPID-1666736
CSAFPID-1666737
CSAFPID-1666738
CSAFPID-1666739
CSAFPID-1666740
CSAFPID-1666741
CSAFPID-1666742
CSAFPID-1666743
CSAFPID-1666744
CSAFPID-1666745
CSAFPID-1666746
CSAFPID-1666747
CSAFPID-1666748
CSAFPID-1666749
CSAFPID-1666750
CSAFPID-1666751
CSAFPID-1666752
CSAFPID-1666753
CSAFPID-1666754
CSAFPID-1666755
CSAFPID-1666756
CSAFPID-1666757
CSAFPID-1666758
CSAFPID-1666759
CSAFPID-1666760
CSAFPID-1666761
CSAFPID-1666762
CSAFPID-1666763
CSAFPID-1666764
CSAFPID-1666765
CSAFPID-1666766
CSAFPID-1666767
CSAFPID-1666768
CSAFPID-1666769
CSAFPID-1666770
CSAFPID-1666771
CSAFPID-1666772
CSAFPID-1666773
CSAFPID-1666774
CSAFPID-1666775
CSAFPID-1666776
CSAFPID-1666777
CSAFPID-1666778
CSAFPID-1666779
CSAFPID-1666780
CSAFPID-1615264
CSAFPID-1666781
7.8 (High)
Product status
Known affected
CSAFPID-1478981
CSAFPID-1478982
CSAFPID-1478983
CSAFPID-1504458
CSAFPID-1504457
CSAFPID-1504459
CWE-427
- Uncontrolled Search Path Element
Product status
Known affected
CSAFPID-1666362
CSAFPID-1666363
CSAFPID-718304
CSAFPID-718303
6.7 (Medium)
Product status
Known affected
CSAFPID-1666362
CSAFPID-1666363
CSAFPID-718304
CSAFPID-718303
6.7 (Medium)
Product status
Known affected
CSAFPID-1666362
CSAFPID-1666363
CSAFPID-718304
CSAFPID-718303
9.9 (Critical)
Product status
Known affected
CSAFPID-1666364
CSAFPID-1666459
CWE-77
- Improper Neutralization of Special Elements used in a Command ('Command Injection')
Product status
Known affected
CSAFPID-1666364
CSAFPID-1666459
CWE-22
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Known affected
CSAFPID-1666364
CSAFPID-1666459
CWE-183
- Permissive List of Allowed Inputs
Product status
Known affected
CSAFPID-1666364
CSAFPID-1666459
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Questa/ModelSIM, RUGGEDCOM, SENTRON, SIMATIC, SINEC, Tecnomatix en Teamcenter.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Permissive List of Allowed Inputs",
"title": "CWE-183"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-054046.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254396.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-340240.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-368868.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-426509.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-430425.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-583523.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626178.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-850560.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-852501.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-876787.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-959281.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-10-08T13:49:37.486004Z",
"id": "NCSC-2024-0390",
"initial_release_date": "2024-10-08T13:49:37.486004Z",
"revision_history": [
{
"date": "2024-10-08T13:49:37.486004Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product_id": "CSAFPID-1457919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_",
"product_id": "CSAFPID-1666682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_",
"product_id": "CSAFPID-1666683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_",
"product_id": "CSAFPID-1666684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1666492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1457921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_",
"product_id": "CSAFPID-1666687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_",
"product_id": "CSAFPID-1666688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1666493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1457920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_",
"product_id": "CSAFPID-1666685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_",
"product_id": "CSAFPID-1666686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1666494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1457922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_",
"product_id": "CSAFPID-1666689",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_",
"product_id": "CSAFPID-1666690",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_",
"product_id": "CSAFPID-1666691",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1666495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1457923",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_",
"product_id": "CSAFPID-1666692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_",
"product_id": "CSAFPID-1666693",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_",
"product_id": "CSAFPID-1666694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1666496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1666396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_",
"product_id": "CSAFPID-1666696",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1666497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1666395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_",
"product_id": "CSAFPID-1666695",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1666498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1457925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_",
"product_id": "CSAFPID-1666698",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product_id": "CSAFPID-1666499",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product_id": "CSAFPID-1457924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_",
"product_id": "CSAFPID-1666697",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1666500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1457927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_",
"product_id": "CSAFPID-1666700",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1666501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1457926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_",
"product_id": "CSAFPID-1666699",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1666502",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1457928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_",
"product_id": "CSAFPID-1666701",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_",
"product_id": "CSAFPID-1666702",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_",
"product_id": "CSAFPID-1666703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1666503",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1457929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_",
"product_id": "CSAFPID-1666704",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_",
"product_id": "CSAFPID-1666705",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_",
"product_id": "CSAFPID-1666706",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product_id": "CSAFPID-1666504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product_id": "CSAFPID-1457930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_",
"product_id": "CSAFPID-1666707",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_",
"product_id": "CSAFPID-1666708",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product_id": "CSAFPID-1666505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product_id": "CSAFPID-1457931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_",
"product_id": "CSAFPID-1666709",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_",
"product_id": "CSAFPID-1666710",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product_id": "CSAFPID-1666506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp",
"product_id": "CSAFPID-1457932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_",
"product_id": "CSAFPID-1666711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_",
"product_id": "CSAFPID-1666712",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_",
"product_id": "CSAFPID-1666713",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product_id": "CSAFPID-1666507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp",
"product_id": "CSAFPID-1457933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_",
"product_id": "CSAFPID-1666714",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_",
"product_id": "CSAFPID-1666715",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_",
"product_id": "CSAFPID-1666716",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1666508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1666398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_",
"product_id": "CSAFPID-1666718",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1666509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1666397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_",
"product_id": "CSAFPID-1666717",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product_id": "CSAFPID-1666510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp",
"product_id": "CSAFPID-1457934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_",
"product_id": "CSAFPID-1666719",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product_id": "CSAFPID-1666511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp",
"product_id": "CSAFPID-1457935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_",
"product_id": "CSAFPID-1666720",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product_id": "CSAFPID-1666512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn_dp",
"product_id": "CSAFPID-1457936",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_",
"product_id": "CSAFPID-1666721",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product_id": "CSAFPID-1666513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp",
"product_id": "CSAFPID-1457937",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_",
"product_id": "CSAFPID-1666722",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_",
"product_id": "CSAFPID-1666723",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product_id": "CSAFPID-1666514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp",
"product_id": "CSAFPID-1457938",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_",
"product_id": "CSAFPID-1666724",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product_id": "CSAFPID-1666515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp",
"product_id": "CSAFPID-1457939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_",
"product_id": "CSAFPID-1666725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1666516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp",
"product_id": "CSAFPID-1457940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_",
"product_id": "CSAFPID-1666726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp",
"product_id": "CSAFPID-1457941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1666517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp",
"product_id": "CSAFPID-1457942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_",
"product_id": "CSAFPID-1666727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp",
"product_id": "CSAFPID-1457943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1666464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp",
"product": {
"name": "dp",
"product_id": "CSAFPID-1666465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_mfp",
"product": {
"name": "dp_mfp",
"product_id": "CSAFPID-1666466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_odk",
"product": {
"name": "dp_odk",
"product_id": "CSAFPID-1666467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_odk:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_rail",
"product": {
"name": "dp_rail",
"product_id": "CSAFPID-1666553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_tx_rail",
"product": {
"name": "dp_tx_rail",
"product_id": "CSAFPID-1666554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_tx_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-342618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-1465776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-262618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-262615",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.1.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-193392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-280210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-280214",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.2.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-1666551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.2.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt2go",
"product": {
"name": "jt2go",
"product_id": "CSAFPID-1666552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt2go:13.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt_open",
"product": {
"name": "jt_open",
"product_id": "CSAFPID-362091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt_open:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt_open",
"product": {
"name": "jt_open",
"product_id": "CSAFPID-1497083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:jt_open:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "modelsim",
"product": {
"name": "modelsim",
"product_id": "CSAFPID-718304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "modelsim",
"product": {
"name": "modelsim",
"product_id": "CSAFPID-1666362",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:modelsim:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "plm_xml_sdk",
"product": {
"name": "plm_xml_sdk",
"product_id": "CSAFPID-1514115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:plm_xml_sdk:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "plm_xml_sdk",
"product": {
"name": "plm_xml_sdk",
"product_id": "CSAFPID-1497084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:plm_xml_sdk:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "plm_xml_sdk",
"product": {
"name": "plm_xml_sdk",
"product_id": "CSAFPID-1666417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:plm_xml_sdk:v7.1.0.014:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pss_r_sincal",
"product": {
"name": "pss_r_sincal",
"product_id": "CSAFPID-1666786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pss_r_sincal:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "questa",
"product": {
"name": "questa",
"product_id": "CSAFPID-718303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "questa",
"product": {
"name": "questa",
"product_id": "CSAFPID-1666363",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:questa:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1666468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808lnx__6gk6015-0al20-0gh0_",
"product": {
"name": "ruggedcom_ape1808lnx__6gk6015-0al20-0gh0_",
"product_id": "CSAFPID-1666783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808lnx__6gk6015-0al20-0gh0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808lnx_cc__6gk6015-0al20-0gh1_",
"product": {
"name": "ruggedcom_ape1808lnx_cc__6gk6015-0al20-0gh1_",
"product_id": "CSAFPID-1666784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808lnx_cc__6gk6015-0al20-0gh1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sentron_7km_pac3200",
"product": {
"name": "sentron_7km_pac3200",
"product_id": "CSAFPID-1666578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sentron_7km_pac3200:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sentron_7km_pac3200",
"product": {
"name": "sentron_7km_pac3200",
"product_id": "CSAFPID-1666375",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sentron_7km_pac3200:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sentron_powercenter_1000__7kn1110-0mc00_",
"product": {
"name": "sentron_powercenter_1000__7kn1110-0mc00_",
"product_id": "CSAFPID-1666785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sentron_powercenter_1000__7kn1110-0mc00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_sinec_security_monitor",
"product": {
"name": "siemens_sinec_security_monitor",
"product_id": "CSAFPID-1666364",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siemens_sinec_security_monitor:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf",
"product_id": "CSAFPID-1666469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf",
"product_id": "CSAFPID-1457899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_",
"product_id": "CSAFPID-1666662",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf",
"product_id": "CSAFPID-1666470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf",
"product_id": "CSAFPID-1457901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_",
"product_id": "CSAFPID-1666663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product_id": "CSAFPID-1666664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product_id": "CSAFPID-1457652",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants_",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants_",
"product_id": "CSAFPID-1666471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1666472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly",
"product_id": "CSAFPID-1666376",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_",
"product_id": "CSAFPID-1666805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1666473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc",
"product_id": "CSAFPID-1666377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_",
"product_id": "CSAFPID-1666806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly",
"product_id": "CSAFPID-1666378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_",
"product_id": "CSAFPID-1666807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1666474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly",
"product_id": "CSAFPID-1666379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_",
"product_id": "CSAFPID-1666808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1666475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc",
"product_id": "CSAFPID-1666380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_",
"product_id": "CSAFPID-1666809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly",
"product_id": "CSAFPID-1666381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_",
"product_id": "CSAFPID-1666810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1666476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc",
"product_id": "CSAFPID-1666382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_",
"product_id": "CSAFPID-1666811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly",
"product_id": "CSAFPID-1666383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_",
"product_id": "CSAFPID-1666812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1666477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly",
"product_id": "CSAFPID-1666384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_",
"product_id": "CSAFPID-1666813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1666478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc",
"product_id": "CSAFPID-1666385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_",
"product_id": "CSAFPID-1666814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly",
"product_id": "CSAFPID-1666386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_",
"product_id": "CSAFPID-1666815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1666479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc",
"product_id": "CSAFPID-1666387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_",
"product_id": "CSAFPID-1666816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly",
"product_id": "CSAFPID-1666388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_",
"product_id": "CSAFPID-1666817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1666480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly",
"product_id": "CSAFPID-1666389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_",
"product_id": "CSAFPID-1666818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1666481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc",
"product_id": "CSAFPID-1666390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_",
"product_id": "CSAFPID-1666819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly",
"product_id": "CSAFPID-1666391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_",
"product_id": "CSAFPID-1666820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1666482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc",
"product_id": "CSAFPID-1666392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_",
"product_id": "CSAFPID-1666821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly",
"product_id": "CSAFPID-1666393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_rly:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_",
"product_id": "CSAFPID-1666822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1666483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc",
"product_id": "CSAFPID-1666394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc_dc_dc:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_",
"product_id": "CSAFPID-1666823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1666484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1457913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_",
"product_id": "CSAFPID-1666667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_",
"product_id": "CSAFPID-1666668",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1666485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1457912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_",
"product_id": "CSAFPID-1666665",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_",
"product_id": "CSAFPID-1666666",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1666486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1457914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_",
"product_id": "CSAFPID-1666669",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_",
"product_id": "CSAFPID-1666670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_",
"product_id": "CSAFPID-1666671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product_id": "CSAFPID-1666487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product_id": "CSAFPID-1457915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_",
"product_id": "CSAFPID-1666672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_",
"product_id": "CSAFPID-1666673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_",
"product_id": "CSAFPID-1666674",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1666488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1457916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_",
"product_id": "CSAFPID-1666675",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_",
"product_id": "CSAFPID-1666676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_",
"product_id": "CSAFPID-1666677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product_id": "CSAFPID-1666489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product_id": "CSAFPID-1457917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_",
"product_id": "CSAFPID-1666678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_",
"product_id": "CSAFPID-1666679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1666490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1457918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_",
"product_id": "CSAFPID-1666680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_",
"product_id": "CSAFPID-1666681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product_id": "CSAFPID-1666491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product_id": "CSAFPID-1666518",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp",
"product_id": "CSAFPID-1457944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_",
"product_id": "CSAFPID-1666728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product_id": "CSAFPID-1666519",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp",
"product_id": "CSAFPID-1457945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_",
"product_id": "CSAFPID-1666729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518-4_pn",
"product_id": "CSAFPID-1666520",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk",
"product_id": "CSAFPID-1457946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_",
"product_id": "CSAFPID-1666730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn",
"product_id": "CSAFPID-1666521",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk",
"product_id": "CSAFPID-1457947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_",
"product_id": "CSAFPID-1666731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn",
"product_id": "CSAFPID-1457949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_",
"product_id": "CSAFPID-1666733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1457948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_",
"product_id": "CSAFPID-1666732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn",
"product_id": "CSAFPID-1457951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_",
"product_id": "CSAFPID-1666735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1457950",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_",
"product_id": "CSAFPID-1666734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1666522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro_cpu_1513pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1666523",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro_cpu_1513pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1666524",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro_cpu_1516pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_et_200pro_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1666525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro_cpu_1516pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v2",
"product_id": "CSAFPID-1666526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_f_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v2",
"product_id": "CSAFPID-1666399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_f_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v3",
"product_id": "CSAFPID-1666527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_f_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_f_v3",
"product_id": "CSAFPID-1666400",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_f_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_v2",
"product_id": "CSAFPID-1666528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_v2",
"product_id": "CSAFPID-1666401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_v3",
"product_id": "CSAFPID-1666529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1507s_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1507s_v3",
"product_id": "CSAFPID-1666402",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1507s_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v2",
"product_id": "CSAFPID-1666530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_f_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v2",
"product_id": "CSAFPID-1666403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_f_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v3",
"product_id": "CSAFPID-1666531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_f_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_f_v3",
"product_id": "CSAFPID-1666404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_f_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_t_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_t_v3",
"product_id": "CSAFPID-1666532",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_t_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_t_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_t_v3",
"product_id": "CSAFPID-1666405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_t_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_tf_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_tf_v3",
"product_id": "CSAFPID-1666533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_tf_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_tf_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_tf_v3",
"product_id": "CSAFPID-1666406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_tf_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_v2",
"product_id": "CSAFPID-1666534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_v2",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_v2",
"product_id": "CSAFPID-1666407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_v3",
"product_id": "CSAFPID-1666535",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_cpu_1508s_v3",
"product": {
"name": "simatic_s7-1500_software_controller_cpu_1508s_v3",
"product_id": "CSAFPID-1666408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_cpu_1508s_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_l",
"product": {
"name": "simatic_s7-1500_software_controller_l",
"product_id": "CSAFPID-1666536",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_l:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_linux_v2",
"product": {
"name": "simatic_s7-1500_software_controller_linux_v2",
"product_id": "CSAFPID-1666537",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_linux_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_linux_v2",
"product": {
"name": "simatic_s7-1500_software_controller_linux_v2",
"product_id": "CSAFPID-1666409",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_linux_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_linux_v3",
"product": {
"name": "simatic_s7-1500_software_controller_linux_v3",
"product_id": "CSAFPID-1666824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_linux_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_linux_v3",
"product": {
"name": "simatic_s7-1500_software_controller_linux_v3",
"product_id": "CSAFPID-1666410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_linux_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v2",
"product": {
"name": "simatic_s7-1500_software_controller_v2",
"product_id": "CSAFPID-1666555",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v2",
"product": {
"name": "simatic_s7-1500_software_controller_v2",
"product_id": "CSAFPID-1457952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v3",
"product": {
"name": "simatic_s7-1500_software_controller_v3",
"product_id": "CSAFPID-1666556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v3",
"product": {
"name": "simatic_s7-1500_software_controller_v3",
"product_id": "CSAFPID-1457953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_advanced",
"product": {
"name": "simatic_s7-plcsim_advanced",
"product_id": "CSAFPID-710676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_advanced",
"product": {
"name": "simatic_s7-plcsim_advanced",
"product_id": "CSAFPID-1457954",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2306",
"product": {
"name": "simcenter_nastran_2306",
"product_id": "CSAFPID-1504458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2306:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2306",
"product": {
"name": "simcenter_nastran_2306",
"product_id": "CSAFPID-1478981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2306:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2312",
"product": {
"name": "simcenter_nastran_2312",
"product_id": "CSAFPID-1504457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2312:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2312",
"product": {
"name": "simcenter_nastran_2312",
"product_id": "CSAFPID-1478982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2312:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2406",
"product": {
"name": "simcenter_nastran_2406",
"product_id": "CSAFPID-1504459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2406:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simcenter_nastran_2406",
"product": {
"name": "simcenter_nastran_2406",
"product_id": "CSAFPID-1478983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simcenter_nastran_2406:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_security_monitor",
"product": {
"name": "sinec_security_monitor",
"product_id": "CSAFPID-1666459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1666557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1457972",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_",
"product_id": "CSAFPID-1666738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_",
"product_id": "CSAFPID-1666739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product_id": "CSAFPID-1666558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product_id": "CSAFPID-1457973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_",
"product_id": "CSAFPID-1666740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_",
"product_id": "CSAFPID-1666741",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1666559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1457970",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_",
"product_id": "CSAFPID-1666736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product_id": "CSAFPID-1666560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product_id": "CSAFPID-1457971",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_",
"product_id": "CSAFPID-1666737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1666561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1457976",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_",
"product_id": "CSAFPID-1666746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_",
"product_id": "CSAFPID-1666747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product_id": "CSAFPID-1666562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product_id": "CSAFPID-1457977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_",
"product_id": "CSAFPID-1666748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_",
"product_id": "CSAFPID-1666749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1666563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1457974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_",
"product_id": "CSAFPID-1666742",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_",
"product_id": "CSAFPID-1666743",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product_id": "CSAFPID-1666564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product_id": "CSAFPID-1457975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_",
"product_id": "CSAFPID-1666744",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_",
"product_id": "CSAFPID-1666745",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1666565",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1457978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_",
"product_id": "CSAFPID-1666750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_",
"product_id": "CSAFPID-1666751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_",
"product_id": "CSAFPID-1666752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_",
"product_id": "CSAFPID-1666753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product_id": "CSAFPID-1666566",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product_id": "CSAFPID-1457979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_",
"product_id": "CSAFPID-1666754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_",
"product_id": "CSAFPID-1666755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product_id": "CSAFPID-1666567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product_id": "CSAFPID-1457980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_",
"product_id": "CSAFPID-1666756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_",
"product_id": "CSAFPID-1666757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1666568",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1457981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_",
"product_id": "CSAFPID-1666758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_",
"product_id": "CSAFPID-1666759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1666569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1457982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_",
"product_id": "CSAFPID-1666760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_",
"product_id": "CSAFPID-1666761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_",
"product_id": "CSAFPID-1666762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_",
"product_id": "CSAFPID-1666763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1666570",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1457983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_",
"product_id": "CSAFPID-1666764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_",
"product_id": "CSAFPID-1666765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1666571",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1457984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_",
"product_id": "CSAFPID-1666766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_",
"product_id": "CSAFPID-1666767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product_id": "CSAFPID-1666572",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product_id": "CSAFPID-1457985",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_",
"product_id": "CSAFPID-1666768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product_id": "CSAFPID-1666573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product_id": "CSAFPID-1457986",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_",
"product_id": "CSAFPID-1666769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail",
"product_id": "CSAFPID-1458007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_",
"product_id": "CSAFPID-1666825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn",
"product_id": "CSAFPID-1666574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp",
"product_id": "CSAFPID-1457987",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_",
"product_id": "CSAFPID-1666770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_",
"product_id": "CSAFPID-1666771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_",
"product_id": "CSAFPID-1666772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_",
"product_id": "CSAFPID-1666773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail",
"product_id": "CSAFPID-1457988",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_",
"product_id": "CSAFPID-1666774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail",
"product_id": "CSAFPID-1457989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_",
"product_id": "CSAFPID-1666775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn",
"product_id": "CSAFPID-1666575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp",
"product_id": "CSAFPID-1457990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_",
"product_id": "CSAFPID-1666776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_",
"product_id": "CSAFPID-1666777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail",
"product_id": "CSAFPID-1457991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp_rail:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_",
"product_id": "CSAFPID-1666778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_",
"product_id": "CSAFPID-1666779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1666576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp",
"product_id": "CSAFPID-1457992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_",
"product_id": "CSAFPID-1666780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp",
"product_id": "CSAFPID-1457993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1666577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp",
"product_id": "CSAFPID-1457994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn_dp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_",
"product_id": "CSAFPID-1666781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.2",
"product": {
"name": "teamcenter_visualization_v14.2",
"product_id": "CSAFPID-1615270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.2",
"product": {
"name": "teamcenter_visualization_v14.2",
"product_id": "CSAFPID-1465778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.3",
"product": {
"name": "teamcenter_visualization_v14.3",
"product_id": "CSAFPID-1615271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v14.3",
"product": {
"name": "teamcenter_visualization_v14.3",
"product_id": "CSAFPID-1465779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v14.3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2312",
"product": {
"name": "teamcenter_visualization_v2312",
"product_id": "CSAFPID-1615272",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2312:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2312",
"product": {
"name": "teamcenter_visualization_v2312",
"product_id": "CSAFPID-1465780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2312:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2406",
"product": {
"name": "teamcenter_visualization_v2406",
"product_id": "CSAFPID-1666832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2406:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "teamcenter_visualization_v2406",
"product": {
"name": "teamcenter_visualization_v2406",
"product_id": "CSAFPID-1666374",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:teamcenter_visualization_v2406:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2302",
"product": {
"name": "tecnomatix_plant_simulation_v2302",
"product_id": "CSAFPID-1637816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2302:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2302",
"product": {
"name": "tecnomatix_plant_simulation_v2302",
"product_id": "CSAFPID-1465025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2302:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2404",
"product": {
"name": "tecnomatix_plant_simulation_v2404",
"product_id": "CSAFPID-1637817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2404:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tecnomatix_plant_simulation_v2404",
"product": {
"name": "tecnomatix_plant_simulation_v2404",
"product_id": "CSAFPID-1476361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation_v2404:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "jt_open",
"product": {
"name": "jt_open",
"product_id": "CSAFPID-1507737",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:jt_open:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6874",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666785"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666785"
]
}
],
"title": "CVE-2023-6874"
},
{
"cve": "CVE-2024-4465",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666783",
"CSAFPID-1666784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1666783",
"CSAFPID-1666784"
]
}
],
"title": "CVE-2024-4465"
},
{
"cve": "CVE-2024-37996",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465776",
"CSAFPID-1465778",
"CSAFPID-1465779",
"CSAFPID-1465780",
"CSAFPID-1666374",
"CSAFPID-342618",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832",
"CSAFPID-1497083",
"CSAFPID-1497084",
"CSAFPID-362091"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1465776",
"CSAFPID-1465778",
"CSAFPID-1465779",
"CSAFPID-1465780",
"CSAFPID-1666374",
"CSAFPID-342618",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832",
"CSAFPID-1497083",
"CSAFPID-1497084",
"CSAFPID-362091"
]
}
],
"title": "CVE-2024-37996"
},
{
"cve": "CVE-2024-37997",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465776",
"CSAFPID-1465778",
"CSAFPID-1465779",
"CSAFPID-1465780",
"CSAFPID-1666374",
"CSAFPID-342618",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832",
"CSAFPID-1497083",
"CSAFPID-1497084",
"CSAFPID-362091"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37997",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37997.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465776",
"CSAFPID-1465778",
"CSAFPID-1465779",
"CSAFPID-1465780",
"CSAFPID-1666374",
"CSAFPID-342618",
"CSAFPID-1615270",
"CSAFPID-1615271",
"CSAFPID-1615272",
"CSAFPID-1666832",
"CSAFPID-1497083",
"CSAFPID-1497084",
"CSAFPID-362091"
]
}
],
"title": "CVE-2024-37997"
},
{
"cve": "CVE-2024-41798",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666375",
"CSAFPID-1666578"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41798",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666375",
"CSAFPID-1666578"
]
}
],
"title": "CVE-2024-41798"
},
{
"cve": "CVE-2024-41902",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465776",
"CSAFPID-342618"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41902",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41902.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465776",
"CSAFPID-342618"
]
}
],
"title": "CVE-2024-41902"
},
{
"cve": "CVE-2024-41981",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41981.json"
}
],
"title": "CVE-2024-41981"
},
{
"cve": "CVE-2024-45181",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666786"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45181",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45181.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666786"
]
}
],
"title": "CVE-2024-45181"
},
{
"cve": "CVE-2024-45182",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666786"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666786"
]
}
],
"title": "CVE-2024-45182"
},
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45463.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45464.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45468",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45468.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45470",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45470.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45471.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1465025",
"CSAFPID-1476361",
"CSAFPID-1637816",
"CSAFPID-1637817"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-46886",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1457899",
"CSAFPID-1457901",
"CSAFPID-1457652",
"CSAFPID-1666376",
"CSAFPID-1666377",
"CSAFPID-1666378",
"CSAFPID-1666379",
"CSAFPID-1666380",
"CSAFPID-1666381",
"CSAFPID-1666382",
"CSAFPID-1666383",
"CSAFPID-1666384",
"CSAFPID-1666385",
"CSAFPID-1666386",
"CSAFPID-1666387",
"CSAFPID-1666388",
"CSAFPID-1666389",
"CSAFPID-1666390",
"CSAFPID-1666391",
"CSAFPID-1666392",
"CSAFPID-1666393",
"CSAFPID-1666394",
"CSAFPID-1457912",
"CSAFPID-1457913",
"CSAFPID-1457914",
"CSAFPID-1457915",
"CSAFPID-1457916",
"CSAFPID-1457917",
"CSAFPID-1457918",
"CSAFPID-1457919",
"CSAFPID-1457920",
"CSAFPID-1457921",
"CSAFPID-1457922",
"CSAFPID-1457923",
"CSAFPID-1666395",
"CSAFPID-1666396",
"CSAFPID-1457924",
"CSAFPID-1457925",
"CSAFPID-1457926",
"CSAFPID-1457927",
"CSAFPID-1457928",
"CSAFPID-1457929",
"CSAFPID-1457930",
"CSAFPID-1457931",
"CSAFPID-1457932",
"CSAFPID-1457933",
"CSAFPID-1666397",
"CSAFPID-1666398",
"CSAFPID-1457934",
"CSAFPID-1457935",
"CSAFPID-1457936",
"CSAFPID-1457937",
"CSAFPID-1457938",
"CSAFPID-1457939",
"CSAFPID-1457940",
"CSAFPID-1457941",
"CSAFPID-1457942",
"CSAFPID-1457943",
"CSAFPID-1457944",
"CSAFPID-1457945",
"CSAFPID-1457946",
"CSAFPID-1457947",
"CSAFPID-1457948",
"CSAFPID-1457949",
"CSAFPID-1457950",
"CSAFPID-1457951",
"CSAFPID-1666399",
"CSAFPID-1666400",
"CSAFPID-1666401",
"CSAFPID-1666402",
"CSAFPID-1666403",
"CSAFPID-1666404",
"CSAFPID-1666405",
"CSAFPID-1666406",
"CSAFPID-1666407",
"CSAFPID-1666408",
"CSAFPID-1666409",
"CSAFPID-1666410",
"CSAFPID-1457954",
"CSAFPID-1457970",
"CSAFPID-1457971",
"CSAFPID-1457972",
"CSAFPID-1457973",
"CSAFPID-1457974",
"CSAFPID-1457975",
"CSAFPID-1457976",
"CSAFPID-1457977",
"CSAFPID-1457978",
"CSAFPID-1457979",
"CSAFPID-1457980",
"CSAFPID-1457981",
"CSAFPID-1457982",
"CSAFPID-1457983",
"CSAFPID-1457984",
"CSAFPID-1457985",
"CSAFPID-1457986",
"CSAFPID-1458007",
"CSAFPID-1457987",
"CSAFPID-1457988",
"CSAFPID-1457989",
"CSAFPID-1457990",
"CSAFPID-1457991",
"CSAFPID-1457992",
"CSAFPID-1457993",
"CSAFPID-1457994",
"CSAFPID-1666526",
"CSAFPID-1666527",
"CSAFPID-1666528",
"CSAFPID-1666529",
"CSAFPID-1666530",
"CSAFPID-1666531",
"CSAFPID-1666532",
"CSAFPID-1666533",
"CSAFPID-1666534",
"CSAFPID-1666535",
"CSAFPID-1666537",
"CSAFPID-1666662",
"CSAFPID-1666663",
"CSAFPID-1666664",
"CSAFPID-1666805",
"CSAFPID-1666806",
"CSAFPID-1666807",
"CSAFPID-1666808",
"CSAFPID-1666809",
"CSAFPID-1666810",
"CSAFPID-1666811",
"CSAFPID-1666812",
"CSAFPID-1666813",
"CSAFPID-1666814",
"CSAFPID-1666815",
"CSAFPID-1666816",
"CSAFPID-1666817",
"CSAFPID-1666818",
"CSAFPID-1666819",
"CSAFPID-1666820",
"CSAFPID-1666821",
"CSAFPID-1666822",
"CSAFPID-1666823",
"CSAFPID-1666665",
"CSAFPID-1666666",
"CSAFPID-1666667",
"CSAFPID-1666668",
"CSAFPID-1666669",
"CSAFPID-1666670",
"CSAFPID-1666671",
"CSAFPID-1666672",
"CSAFPID-1666673",
"CSAFPID-1666674",
"CSAFPID-1666675",
"CSAFPID-1666676",
"CSAFPID-1666677",
"CSAFPID-1666678",
"CSAFPID-1666679",
"CSAFPID-1666680",
"CSAFPID-1666681",
"CSAFPID-1666682",
"CSAFPID-1666683",
"CSAFPID-1666684",
"CSAFPID-1666685",
"CSAFPID-1666686",
"CSAFPID-1666687",
"CSAFPID-1666688",
"CSAFPID-1666689",
"CSAFPID-1666690",
"CSAFPID-1666691",
"CSAFPID-1666692",
"CSAFPID-1666693",
"CSAFPID-1666694",
"CSAFPID-1666695",
"CSAFPID-1666696",
"CSAFPID-1666697",
"CSAFPID-1666698",
"CSAFPID-1666699",
"CSAFPID-1666700",
"CSAFPID-1666701",
"CSAFPID-1666702",
"CSAFPID-1666703",
"CSAFPID-1666704",
"CSAFPID-1666705",
"CSAFPID-1666706",
"CSAFPID-1666707",
"CSAFPID-1666708",
"CSAFPID-1666709",
"CSAFPID-1666710",
"CSAFPID-1666711",
"CSAFPID-1666712",
"CSAFPID-1666713",
"CSAFPID-1666714",
"CSAFPID-1666715",
"CSAFPID-1666716",
"CSAFPID-1666717",
"CSAFPID-1666718",
"CSAFPID-1666719",
"CSAFPID-1666720",
"CSAFPID-1666721",
"CSAFPID-1666722",
"CSAFPID-1666723",
"CSAFPID-1666724",
"CSAFPID-1666725",
"CSAFPID-1666726",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1666727",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1666728",
"CSAFPID-1666729",
"CSAFPID-1666730",
"CSAFPID-1666731",
"CSAFPID-1666732",
"CSAFPID-1666733",
"CSAFPID-1666734",
"CSAFPID-1666735",
"CSAFPID-1666824",
"CSAFPID-710676",
"CSAFPID-1666736",
"CSAFPID-1666737",
"CSAFPID-1666738",
"CSAFPID-1666739",
"CSAFPID-1666740",
"CSAFPID-1666741",
"CSAFPID-1666742",
"CSAFPID-1666743",
"CSAFPID-1666744",
"CSAFPID-1666745",
"CSAFPID-1666746",
"CSAFPID-1666747",
"CSAFPID-1666748",
"CSAFPID-1666749",
"CSAFPID-1666750",
"CSAFPID-1666751",
"CSAFPID-1666752",
"CSAFPID-1666753",
"CSAFPID-1666754",
"CSAFPID-1666755",
"CSAFPID-1666756",
"CSAFPID-1666757",
"CSAFPID-1666758",
"CSAFPID-1666759",
"CSAFPID-1666760",
"CSAFPID-1666761",
"CSAFPID-1666762",
"CSAFPID-1666763",
"CSAFPID-1666764",
"CSAFPID-1666765",
"CSAFPID-1666766",
"CSAFPID-1666767",
"CSAFPID-1666768",
"CSAFPID-1666769",
"CSAFPID-1666825",
"CSAFPID-1666770",
"CSAFPID-1666771",
"CSAFPID-1666772",
"CSAFPID-1666773",
"CSAFPID-1666774",
"CSAFPID-1666775",
"CSAFPID-1666776",
"CSAFPID-1666777",
"CSAFPID-1666778",
"CSAFPID-1666779",
"CSAFPID-1666780",
"CSAFPID-1615264",
"CSAFPID-1666781"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46886",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46886.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1457899",
"CSAFPID-1457901",
"CSAFPID-1457652",
"CSAFPID-1666376",
"CSAFPID-1666377",
"CSAFPID-1666378",
"CSAFPID-1666379",
"CSAFPID-1666380",
"CSAFPID-1666381",
"CSAFPID-1666382",
"CSAFPID-1666383",
"CSAFPID-1666384",
"CSAFPID-1666385",
"CSAFPID-1666386",
"CSAFPID-1666387",
"CSAFPID-1666388",
"CSAFPID-1666389",
"CSAFPID-1666390",
"CSAFPID-1666391",
"CSAFPID-1666392",
"CSAFPID-1666393",
"CSAFPID-1666394",
"CSAFPID-1457912",
"CSAFPID-1457913",
"CSAFPID-1457914",
"CSAFPID-1457915",
"CSAFPID-1457916",
"CSAFPID-1457917",
"CSAFPID-1457918",
"CSAFPID-1457919",
"CSAFPID-1457920",
"CSAFPID-1457921",
"CSAFPID-1457922",
"CSAFPID-1457923",
"CSAFPID-1666395",
"CSAFPID-1666396",
"CSAFPID-1457924",
"CSAFPID-1457925",
"CSAFPID-1457926",
"CSAFPID-1457927",
"CSAFPID-1457928",
"CSAFPID-1457929",
"CSAFPID-1457930",
"CSAFPID-1457931",
"CSAFPID-1457932",
"CSAFPID-1457933",
"CSAFPID-1666397",
"CSAFPID-1666398",
"CSAFPID-1457934",
"CSAFPID-1457935",
"CSAFPID-1457936",
"CSAFPID-1457937",
"CSAFPID-1457938",
"CSAFPID-1457939",
"CSAFPID-1457940",
"CSAFPID-1457941",
"CSAFPID-1457942",
"CSAFPID-1457943",
"CSAFPID-1457944",
"CSAFPID-1457945",
"CSAFPID-1457946",
"CSAFPID-1457947",
"CSAFPID-1457948",
"CSAFPID-1457949",
"CSAFPID-1457950",
"CSAFPID-1457951",
"CSAFPID-1666399",
"CSAFPID-1666400",
"CSAFPID-1666401",
"CSAFPID-1666402",
"CSAFPID-1666403",
"CSAFPID-1666404",
"CSAFPID-1666405",
"CSAFPID-1666406",
"CSAFPID-1666407",
"CSAFPID-1666408",
"CSAFPID-1666409",
"CSAFPID-1666410",
"CSAFPID-1457954",
"CSAFPID-1457970",
"CSAFPID-1457971",
"CSAFPID-1457972",
"CSAFPID-1457973",
"CSAFPID-1457974",
"CSAFPID-1457975",
"CSAFPID-1457976",
"CSAFPID-1457977",
"CSAFPID-1457978",
"CSAFPID-1457979",
"CSAFPID-1457980",
"CSAFPID-1457981",
"CSAFPID-1457982",
"CSAFPID-1457983",
"CSAFPID-1457984",
"CSAFPID-1457985",
"CSAFPID-1457986",
"CSAFPID-1458007",
"CSAFPID-1457987",
"CSAFPID-1457988",
"CSAFPID-1457989",
"CSAFPID-1457990",
"CSAFPID-1457991",
"CSAFPID-1457992",
"CSAFPID-1457993",
"CSAFPID-1457994",
"CSAFPID-1666526",
"CSAFPID-1666527",
"CSAFPID-1666528",
"CSAFPID-1666529",
"CSAFPID-1666530",
"CSAFPID-1666531",
"CSAFPID-1666532",
"CSAFPID-1666533",
"CSAFPID-1666534",
"CSAFPID-1666535",
"CSAFPID-1666537",
"CSAFPID-1666662",
"CSAFPID-1666663",
"CSAFPID-1666664",
"CSAFPID-1666805",
"CSAFPID-1666806",
"CSAFPID-1666807",
"CSAFPID-1666808",
"CSAFPID-1666809",
"CSAFPID-1666810",
"CSAFPID-1666811",
"CSAFPID-1666812",
"CSAFPID-1666813",
"CSAFPID-1666814",
"CSAFPID-1666815",
"CSAFPID-1666816",
"CSAFPID-1666817",
"CSAFPID-1666818",
"CSAFPID-1666819",
"CSAFPID-1666820",
"CSAFPID-1666821",
"CSAFPID-1666822",
"CSAFPID-1666823",
"CSAFPID-1666665",
"CSAFPID-1666666",
"CSAFPID-1666667",
"CSAFPID-1666668",
"CSAFPID-1666669",
"CSAFPID-1666670",
"CSAFPID-1666671",
"CSAFPID-1666672",
"CSAFPID-1666673",
"CSAFPID-1666674",
"CSAFPID-1666675",
"CSAFPID-1666676",
"CSAFPID-1666677",
"CSAFPID-1666678",
"CSAFPID-1666679",
"CSAFPID-1666680",
"CSAFPID-1666681",
"CSAFPID-1666682",
"CSAFPID-1666683",
"CSAFPID-1666684",
"CSAFPID-1666685",
"CSAFPID-1666686",
"CSAFPID-1666687",
"CSAFPID-1666688",
"CSAFPID-1666689",
"CSAFPID-1666690",
"CSAFPID-1666691",
"CSAFPID-1666692",
"CSAFPID-1666693",
"CSAFPID-1666694",
"CSAFPID-1666695",
"CSAFPID-1666696",
"CSAFPID-1666697",
"CSAFPID-1666698",
"CSAFPID-1666699",
"CSAFPID-1666700",
"CSAFPID-1666701",
"CSAFPID-1666702",
"CSAFPID-1666703",
"CSAFPID-1666704",
"CSAFPID-1666705",
"CSAFPID-1666706",
"CSAFPID-1666707",
"CSAFPID-1666708",
"CSAFPID-1666709",
"CSAFPID-1666710",
"CSAFPID-1666711",
"CSAFPID-1666712",
"CSAFPID-1666713",
"CSAFPID-1666714",
"CSAFPID-1666715",
"CSAFPID-1666716",
"CSAFPID-1666717",
"CSAFPID-1666718",
"CSAFPID-1666719",
"CSAFPID-1666720",
"CSAFPID-1666721",
"CSAFPID-1666722",
"CSAFPID-1666723",
"CSAFPID-1666724",
"CSAFPID-1666725",
"CSAFPID-1666726",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1666727",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1666728",
"CSAFPID-1666729",
"CSAFPID-1666730",
"CSAFPID-1666731",
"CSAFPID-1666732",
"CSAFPID-1666733",
"CSAFPID-1666734",
"CSAFPID-1666735",
"CSAFPID-1666824",
"CSAFPID-710676",
"CSAFPID-1666736",
"CSAFPID-1666737",
"CSAFPID-1666738",
"CSAFPID-1666739",
"CSAFPID-1666740",
"CSAFPID-1666741",
"CSAFPID-1666742",
"CSAFPID-1666743",
"CSAFPID-1666744",
"CSAFPID-1666745",
"CSAFPID-1666746",
"CSAFPID-1666747",
"CSAFPID-1666748",
"CSAFPID-1666749",
"CSAFPID-1666750",
"CSAFPID-1666751",
"CSAFPID-1666752",
"CSAFPID-1666753",
"CSAFPID-1666754",
"CSAFPID-1666755",
"CSAFPID-1666756",
"CSAFPID-1666757",
"CSAFPID-1666758",
"CSAFPID-1666759",
"CSAFPID-1666760",
"CSAFPID-1666761",
"CSAFPID-1666762",
"CSAFPID-1666763",
"CSAFPID-1666764",
"CSAFPID-1666765",
"CSAFPID-1666766",
"CSAFPID-1666767",
"CSAFPID-1666768",
"CSAFPID-1666769",
"CSAFPID-1666825",
"CSAFPID-1666770",
"CSAFPID-1666771",
"CSAFPID-1666772",
"CSAFPID-1666773",
"CSAFPID-1666774",
"CSAFPID-1666775",
"CSAFPID-1666776",
"CSAFPID-1666777",
"CSAFPID-1666778",
"CSAFPID-1666779",
"CSAFPID-1666780",
"CSAFPID-1615264",
"CSAFPID-1666781"
]
}
],
"title": "CVE-2024-46886"
},
{
"cve": "CVE-2024-46887",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1457899",
"CSAFPID-1457901",
"CSAFPID-1457652",
"CSAFPID-1457912",
"CSAFPID-1457913",
"CSAFPID-1457914",
"CSAFPID-1457915",
"CSAFPID-1457916",
"CSAFPID-1457917",
"CSAFPID-1457918",
"CSAFPID-1457919",
"CSAFPID-1457920",
"CSAFPID-1457921",
"CSAFPID-1457922",
"CSAFPID-1457923",
"CSAFPID-1666395",
"CSAFPID-1666396",
"CSAFPID-1457924",
"CSAFPID-1457925",
"CSAFPID-1457926",
"CSAFPID-1457927",
"CSAFPID-1457928",
"CSAFPID-1457929",
"CSAFPID-1457930",
"CSAFPID-1457931",
"CSAFPID-1457932",
"CSAFPID-1457933",
"CSAFPID-1666397",
"CSAFPID-1666398",
"CSAFPID-1457934",
"CSAFPID-1457935",
"CSAFPID-1457936",
"CSAFPID-1457937",
"CSAFPID-1457938",
"CSAFPID-1457939",
"CSAFPID-1457940",
"CSAFPID-1457941",
"CSAFPID-1457942",
"CSAFPID-1457943",
"CSAFPID-1457944",
"CSAFPID-1457945",
"CSAFPID-1457946",
"CSAFPID-1457947",
"CSAFPID-1457948",
"CSAFPID-1457949",
"CSAFPID-1457950",
"CSAFPID-1457951",
"CSAFPID-1457952",
"CSAFPID-1457953",
"CSAFPID-1457954",
"CSAFPID-1457970",
"CSAFPID-1457971",
"CSAFPID-1457972",
"CSAFPID-1457973",
"CSAFPID-1457974",
"CSAFPID-1457975",
"CSAFPID-1457976",
"CSAFPID-1457977",
"CSAFPID-1457978",
"CSAFPID-1457979",
"CSAFPID-1457980",
"CSAFPID-1457981",
"CSAFPID-1457982",
"CSAFPID-1457983",
"CSAFPID-1457984",
"CSAFPID-1457985",
"CSAFPID-1457986",
"CSAFPID-1457987",
"CSAFPID-1457988",
"CSAFPID-1457989",
"CSAFPID-1457990",
"CSAFPID-1457991",
"CSAFPID-1457992",
"CSAFPID-1457993",
"CSAFPID-1457994",
"CSAFPID-1666555",
"CSAFPID-1666556",
"CSAFPID-710676",
"CSAFPID-1666662",
"CSAFPID-1666663",
"CSAFPID-1666664",
"CSAFPID-1666665",
"CSAFPID-1666666",
"CSAFPID-1666667",
"CSAFPID-1666668",
"CSAFPID-1666669",
"CSAFPID-1666670",
"CSAFPID-1666671",
"CSAFPID-1666672",
"CSAFPID-1666673",
"CSAFPID-1666674",
"CSAFPID-1666675",
"CSAFPID-1666676",
"CSAFPID-1666677",
"CSAFPID-1666678",
"CSAFPID-1666679",
"CSAFPID-1666680",
"CSAFPID-1666681",
"CSAFPID-1666682",
"CSAFPID-1666683",
"CSAFPID-1666684",
"CSAFPID-1666685",
"CSAFPID-1666686",
"CSAFPID-1666687",
"CSAFPID-1666688",
"CSAFPID-1666689",
"CSAFPID-1666690",
"CSAFPID-1666691",
"CSAFPID-1666692",
"CSAFPID-1666693",
"CSAFPID-1666694",
"CSAFPID-1666695",
"CSAFPID-1666696",
"CSAFPID-1666697",
"CSAFPID-1666698",
"CSAFPID-1666699",
"CSAFPID-1666700",
"CSAFPID-1666701",
"CSAFPID-1666702",
"CSAFPID-1666703",
"CSAFPID-1666704",
"CSAFPID-1666705",
"CSAFPID-1666706",
"CSAFPID-1666707",
"CSAFPID-1666708",
"CSAFPID-1666709",
"CSAFPID-1666710",
"CSAFPID-1666711",
"CSAFPID-1666712",
"CSAFPID-1666713",
"CSAFPID-1666714",
"CSAFPID-1666715",
"CSAFPID-1666716",
"CSAFPID-1666717",
"CSAFPID-1666718",
"CSAFPID-1666719",
"CSAFPID-1666720",
"CSAFPID-1666721",
"CSAFPID-1666722",
"CSAFPID-1666723",
"CSAFPID-1666724",
"CSAFPID-1666725",
"CSAFPID-1666726",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1666727",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1666728",
"CSAFPID-1666729",
"CSAFPID-1666730",
"CSAFPID-1666731",
"CSAFPID-1666732",
"CSAFPID-1666733",
"CSAFPID-1666734",
"CSAFPID-1666735",
"CSAFPID-1666736",
"CSAFPID-1666737",
"CSAFPID-1666738",
"CSAFPID-1666739",
"CSAFPID-1666740",
"CSAFPID-1666741",
"CSAFPID-1666742",
"CSAFPID-1666743",
"CSAFPID-1666744",
"CSAFPID-1666745",
"CSAFPID-1666746",
"CSAFPID-1666747",
"CSAFPID-1666748",
"CSAFPID-1666749",
"CSAFPID-1666750",
"CSAFPID-1666751",
"CSAFPID-1666752",
"CSAFPID-1666753",
"CSAFPID-1666754",
"CSAFPID-1666755",
"CSAFPID-1666756",
"CSAFPID-1666757",
"CSAFPID-1666758",
"CSAFPID-1666759",
"CSAFPID-1666760",
"CSAFPID-1666761",
"CSAFPID-1666762",
"CSAFPID-1666763",
"CSAFPID-1666764",
"CSAFPID-1666765",
"CSAFPID-1666766",
"CSAFPID-1666767",
"CSAFPID-1666768",
"CSAFPID-1666769",
"CSAFPID-1666770",
"CSAFPID-1666771",
"CSAFPID-1666772",
"CSAFPID-1666773",
"CSAFPID-1666774",
"CSAFPID-1666775",
"CSAFPID-1666776",
"CSAFPID-1666777",
"CSAFPID-1666778",
"CSAFPID-1666779",
"CSAFPID-1666780",
"CSAFPID-1615264",
"CSAFPID-1666781"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1457899",
"CSAFPID-1457901",
"CSAFPID-1457652",
"CSAFPID-1457912",
"CSAFPID-1457913",
"CSAFPID-1457914",
"CSAFPID-1457915",
"CSAFPID-1457916",
"CSAFPID-1457917",
"CSAFPID-1457918",
"CSAFPID-1457919",
"CSAFPID-1457920",
"CSAFPID-1457921",
"CSAFPID-1457922",
"CSAFPID-1457923",
"CSAFPID-1666395",
"CSAFPID-1666396",
"CSAFPID-1457924",
"CSAFPID-1457925",
"CSAFPID-1457926",
"CSAFPID-1457927",
"CSAFPID-1457928",
"CSAFPID-1457929",
"CSAFPID-1457930",
"CSAFPID-1457931",
"CSAFPID-1457932",
"CSAFPID-1457933",
"CSAFPID-1666397",
"CSAFPID-1666398",
"CSAFPID-1457934",
"CSAFPID-1457935",
"CSAFPID-1457936",
"CSAFPID-1457937",
"CSAFPID-1457938",
"CSAFPID-1457939",
"CSAFPID-1457940",
"CSAFPID-1457941",
"CSAFPID-1457942",
"CSAFPID-1457943",
"CSAFPID-1457944",
"CSAFPID-1457945",
"CSAFPID-1457946",
"CSAFPID-1457947",
"CSAFPID-1457948",
"CSAFPID-1457949",
"CSAFPID-1457950",
"CSAFPID-1457951",
"CSAFPID-1457952",
"CSAFPID-1457953",
"CSAFPID-1457954",
"CSAFPID-1457970",
"CSAFPID-1457971",
"CSAFPID-1457972",
"CSAFPID-1457973",
"CSAFPID-1457974",
"CSAFPID-1457975",
"CSAFPID-1457976",
"CSAFPID-1457977",
"CSAFPID-1457978",
"CSAFPID-1457979",
"CSAFPID-1457980",
"CSAFPID-1457981",
"CSAFPID-1457982",
"CSAFPID-1457983",
"CSAFPID-1457984",
"CSAFPID-1457985",
"CSAFPID-1457986",
"CSAFPID-1457987",
"CSAFPID-1457988",
"CSAFPID-1457989",
"CSAFPID-1457990",
"CSAFPID-1457991",
"CSAFPID-1457992",
"CSAFPID-1457993",
"CSAFPID-1457994",
"CSAFPID-1666555",
"CSAFPID-1666556",
"CSAFPID-710676",
"CSAFPID-1666662",
"CSAFPID-1666663",
"CSAFPID-1666664",
"CSAFPID-1666665",
"CSAFPID-1666666",
"CSAFPID-1666667",
"CSAFPID-1666668",
"CSAFPID-1666669",
"CSAFPID-1666670",
"CSAFPID-1666671",
"CSAFPID-1666672",
"CSAFPID-1666673",
"CSAFPID-1666674",
"CSAFPID-1666675",
"CSAFPID-1666676",
"CSAFPID-1666677",
"CSAFPID-1666678",
"CSAFPID-1666679",
"CSAFPID-1666680",
"CSAFPID-1666681",
"CSAFPID-1666682",
"CSAFPID-1666683",
"CSAFPID-1666684",
"CSAFPID-1666685",
"CSAFPID-1666686",
"CSAFPID-1666687",
"CSAFPID-1666688",
"CSAFPID-1666689",
"CSAFPID-1666690",
"CSAFPID-1666691",
"CSAFPID-1666692",
"CSAFPID-1666693",
"CSAFPID-1666694",
"CSAFPID-1666695",
"CSAFPID-1666696",
"CSAFPID-1666697",
"CSAFPID-1666698",
"CSAFPID-1666699",
"CSAFPID-1666700",
"CSAFPID-1666701",
"CSAFPID-1666702",
"CSAFPID-1666703",
"CSAFPID-1666704",
"CSAFPID-1666705",
"CSAFPID-1666706",
"CSAFPID-1666707",
"CSAFPID-1666708",
"CSAFPID-1666709",
"CSAFPID-1666710",
"CSAFPID-1666711",
"CSAFPID-1666712",
"CSAFPID-1666713",
"CSAFPID-1666714",
"CSAFPID-1666715",
"CSAFPID-1666716",
"CSAFPID-1666717",
"CSAFPID-1666718",
"CSAFPID-1666719",
"CSAFPID-1666720",
"CSAFPID-1666721",
"CSAFPID-1666722",
"CSAFPID-1666723",
"CSAFPID-1666724",
"CSAFPID-1666725",
"CSAFPID-1666726",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1666727",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1666728",
"CSAFPID-1666729",
"CSAFPID-1666730",
"CSAFPID-1666731",
"CSAFPID-1666732",
"CSAFPID-1666733",
"CSAFPID-1666734",
"CSAFPID-1666735",
"CSAFPID-1666736",
"CSAFPID-1666737",
"CSAFPID-1666738",
"CSAFPID-1666739",
"CSAFPID-1666740",
"CSAFPID-1666741",
"CSAFPID-1666742",
"CSAFPID-1666743",
"CSAFPID-1666744",
"CSAFPID-1666745",
"CSAFPID-1666746",
"CSAFPID-1666747",
"CSAFPID-1666748",
"CSAFPID-1666749",
"CSAFPID-1666750",
"CSAFPID-1666751",
"CSAFPID-1666752",
"CSAFPID-1666753",
"CSAFPID-1666754",
"CSAFPID-1666755",
"CSAFPID-1666756",
"CSAFPID-1666757",
"CSAFPID-1666758",
"CSAFPID-1666759",
"CSAFPID-1666760",
"CSAFPID-1666761",
"CSAFPID-1666762",
"CSAFPID-1666763",
"CSAFPID-1666764",
"CSAFPID-1666765",
"CSAFPID-1666766",
"CSAFPID-1666767",
"CSAFPID-1666768",
"CSAFPID-1666769",
"CSAFPID-1666770",
"CSAFPID-1666771",
"CSAFPID-1666772",
"CSAFPID-1666773",
"CSAFPID-1666774",
"CSAFPID-1666775",
"CSAFPID-1666776",
"CSAFPID-1666777",
"CSAFPID-1666778",
"CSAFPID-1666779",
"CSAFPID-1666780",
"CSAFPID-1615264",
"CSAFPID-1666781"
]
}
],
"title": "CVE-2024-46887"
},
{
"cve": "CVE-2024-47046",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1478981",
"CSAFPID-1478982",
"CSAFPID-1478983",
"CSAFPID-1504458",
"CSAFPID-1504457",
"CSAFPID-1504459"
]
}
],
"title": "CVE-2024-47046"
},
{
"cve": "CVE-2024-47194",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666362",
"CSAFPID-1666363",
"CSAFPID-718304",
"CSAFPID-718303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47194.json"
}
],
"title": "CVE-2024-47194"
},
{
"cve": "CVE-2024-47195",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666362",
"CSAFPID-1666363",
"CSAFPID-718304",
"CSAFPID-718303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666362",
"CSAFPID-1666363",
"CSAFPID-718304",
"CSAFPID-718303"
]
}
],
"title": "CVE-2024-47195"
},
{
"cve": "CVE-2024-47196",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666362",
"CSAFPID-1666363",
"CSAFPID-718304",
"CSAFPID-718303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1666362",
"CSAFPID-1666363",
"CSAFPID-718304",
"CSAFPID-718303"
]
}
],
"title": "CVE-2024-47196"
},
{
"cve": "CVE-2024-47553",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
}
],
"title": "CVE-2024-47553"
},
{
"cve": "CVE-2024-47562",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47562",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47562.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
}
],
"title": "CVE-2024-47562"
},
{
"cve": "CVE-2024-47563",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47563",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47563.json"
}
],
"title": "CVE-2024-47563"
},
{
"cve": "CVE-2024-47565",
"cwe": {
"id": "CWE-183",
"name": "Permissive List of Allowed Inputs"
},
"notes": [
{
"category": "other",
"text": "Permissive List of Allowed Inputs",
"title": "CWE-183"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47565",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1666364",
"CSAFPID-1666459"
]
}
],
"title": "CVE-2024-47565"
}
]
}
SSA-583523
Vulnerability from csaf_siemens - Published: 2024-10-08 00:00 - Updated: 2024-12-10 00:00Summary
SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation
Notes
Summary: Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
CWE-476
- NULL Pointer Dereference
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V2302.0016 or later version
Vendor Fix
Update to V2404.0005 or later version
Product status
Known affected
1
2
References
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"category": "self",
"summary": "SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-583523.json"
}
],
"title": "SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation",
"tracking": {
"current_release_date": "2024-12-10T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-583523",
"initial_release_date": "2024-10-08T00:00:00Z",
"revision_history": [
{
"date": "2024-10-08T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2024-53041 and CVE-2024-53242"
}
],
"status": "interim",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV2302.0016",
"product": {
"name": "Tecnomatix Plant Simulation V2302",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2302"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV2404.0005",
"product": {
"name": "Tecnomatix Plant Simulation V2404",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Tecnomatix Plant Simulation V2404"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a null pointer dereference vulnerability while parsing specially crafted WRL files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-53041",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-53041"
},
{
"cve": "CVE-2024-53242",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2302.0016 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V2404.0005 or later version",
"product_ids": [
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2024-53242"
}
]
}
SSA-645131
Vulnerability from csaf_siemens - Published: 2024-12-10 00:00 - Updated: 2024-12-10 00:00Summary
SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization
Notes
Summary: Siemens Teamcenter Visualization contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
CWE-476
- NULL Pointer Dereference
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Vendor Fix
Update to V2406.0005 or later version
Product status
Known affected
1
2
3
4
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
7.8 (High)
Mitigation
Do not open untrusted WRL files in affected applications
Vendor Fix
Update to V14.2.0.14 or later version
Vendor Fix
Update to V14.3.0.12 or later version
Vendor Fix
Update to V2312.0008 or later version
Product status
Known affected
1
2
3
References
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Siemens Teamcenter Visualization contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
},
{
"category": "self",
"summary": "SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-645131.json"
}
],
"title": "SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization",
"tracking": {
"current_release_date": "2024-12-10T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-645131",
"initial_release_date": "2024-12-10T00:00:00Z",
"revision_history": [
{
"date": "2024-12-10T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV14.2.0.14",
"product": {
"name": "Teamcenter Visualization V14.2",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V14.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV14.3.0.12",
"product": {
"name": "Teamcenter Visualization V14.3",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V14.3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV2312.0008",
"product": {
"name": "Teamcenter Visualization V2312",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2312"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV2406.0005",
"product": {
"name": "Teamcenter Visualization V2406",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization V2406"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-45463",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45463"
},
{
"cve": "CVE-2024-45464",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45464"
},
{
"cve": "CVE-2024-45465",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45465"
},
{
"cve": "CVE-2024-45466",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45466"
},
{
"cve": "CVE-2024-45467",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45467"
},
{
"cve": "CVE-2024-45468",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45468"
},
{
"cve": "CVE-2024-45469",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45469"
},
{
"cve": "CVE-2024-45470",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45470"
},
{
"cve": "CVE-2024-45471",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45471"
},
{
"cve": "CVE-2024-45472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45472"
},
{
"cve": "CVE-2024-45473",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45473"
},
{
"cve": "CVE-2024-45474",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45474"
},
{
"cve": "CVE-2024-45475",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45475"
},
{
"cve": "CVE-2024-45476",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a null pointer dereference vulnerability while parsing specially crafted WRL files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-45476"
},
{
"cve": "CVE-2024-52565",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24231)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52565"
},
{
"cve": "CVE-2024-52566",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24233)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52566"
},
{
"cve": "CVE-2024-52567",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24237)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52567"
},
{
"cve": "CVE-2024-52568",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files.\r\nAn attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-24244)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52568"
},
{
"cve": "CVE-2024-52569",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24260)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52569"
},
{
"cve": "CVE-2024-52570",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24365)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52570"
},
{
"cve": "CVE-2024-52571",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24485)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52571"
},
{
"cve": "CVE-2024-52572",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24486)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52572"
},
{
"cve": "CVE-2024-52573",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24521)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52573"
},
{
"cve": "CVE-2024-52574",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24543)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3",
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V2406.0005 or later version",
"product_ids": [
"4"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"title": "CVE-2024-52574"
},
{
"cve": "CVE-2024-53041",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-53041"
},
{
"cve": "CVE-2024-53242",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.\r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Do not open untrusted WRL files in affected applications",
"product_ids": [
"1",
"2",
"3"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.2.0.14 or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V14.3.0.12 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V2312.0008 or later version",
"product_ids": [
"3"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2024-53242"
}
]
}
FKIE_CVE-2024-45464
Vulnerability from fkie_nvd - Published: 2024-10-08 09:15 - Updated: 2024-12-10 14:30
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | tecnomatix_plant_simulation | * | |
| siemens | tecnomatix_plant_simulation | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00AE6AA5-618F-4494-B8D6-2AC25A5DC2F1",
"versionEndExcluding": "2302.0016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E84CE123-587E-480C-A6C8-AF7B4AE3ACF2",
"versionEndExcluding": "2404.0005",
"versionStartIncluding": "2303.0000",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual."
}
],
"id": "CVE-2024-45464",
"lastModified": "2024-12-10T14:30:41.117",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "productcert@siemens.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "productcert@siemens.com",
"type": "Secondary"
}
]
},
"published": "2024-10-08T09:15:12.370",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"source": "productcert@siemens.com",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "productcert@siemens.com",
"type": "Secondary"
}
]
}
GHSA-39HR-MRX8-6R9R
Vulnerability from github – Published: 2024-10-08 09:30 – Updated: 2024-12-10 15:32
VLAI?
Details
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2024-45464"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-08T09:15:12Z",
"severity": "HIGH"
},
"details": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"id": "GHSA-39hr-mrx8-6r9r",
"modified": "2024-12-10T15:32:30Z",
"published": "2024-10-08T09:30:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45464"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…