17 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 128EXPL: 0

A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service. An unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device. Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 6MD86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 6MD89 ( CP300) (Todas las versiones &gt;= V7.80 &lt; V9.60), SIPROTEC 5 6MU85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7KE85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SA86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40 ), SIPROTEC 5 7SA87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SD86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SD87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones &gt; = V7.80 &lt; V9.40), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SK85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (Todas las versiones &lt; V9.40 ), SIPROTEC 5 7SL86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SL87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SS85 (CP300) (Todas versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7ST85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.60), SIPROTEC 5 7ST86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40 ), SIPROTEC 5 7SX82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SX85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7UM85 (CP300) (Todas las versiones &gt;= V7. 80 &lt; V9.40), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7UT85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9. 40), SIPROTEC 5 7UT86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7UT87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VE85 (CP300) ( Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VK87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VU85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9. 40), SIPROTEC 5 Communication Module ETH-BA-2EL (todas las versiones &lt; V9.40), SIPROTEC 5 Communication Module ETH-BB-2FO (todas las versiones &lt; V9.40), SIPROTEC 5 Communication Module ETH-BD-2FO (todas versiones &lt; V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (Todas las versiones &lt; V9.40). Los dispositivos afectados carecen de una validación adecuada de los parámetros de solicitud http del servicio web alojado. Un atacante remoto no autenticado podría enviar paquetes especialmente manipulados que podrían provocar una condición de denegación de servicio del dispositivo objetivo. • https://cert-portal.siemens.com/productcert/html/ssa-322980.html https://cert-portal.siemens.com/productcert/pdf/ssa-322980.pdf • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 120EXPL: 0

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.50), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.50), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.50), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.50), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.50), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.50), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.50), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.50), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.50), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.50), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.50), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.50), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.50), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.50), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.50), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.50), SIPROTEC 5 7SX85 (CP300) (All versions < V9.50), SIPROTEC 5 7UM85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.50), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.50), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.50), SIPROTEC 5 7VE85 (CP300) (All versions < V9.50), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.50), SIPROTEC 5 7VU85 (CP300) (All versions < V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.50). Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial of service condition on the ports 443/tcp and 4443/tcp for the duration of the attack. Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD85 (CP200) (Todas las versiones), SIPROTEC 5 6MD85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD86 (CP200) (Todas las versiones), SIPROTEC 5 6MD86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD89 (CP300) (versiones &lt; V9.60), SIPROTEC 5 6MU85 (CP300) (versiones &lt; V9. 50), SIPROTEC 5 7KE85 (CP200) (Todas las versiones), SIPROTEC 5 7KE85 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SA84 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SA87 (CP200) (Todas las versiones), SIPROTEC 5 7SA87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SD84 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SD87 (CP200) (Todas las versiones), SIPROTEC 5 7SD87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SJ85 (CP200) (Todas las versiones), SIPROTEC 5 7SJ85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SJ86 (CP200) (Todas las versiones), SIPROTEC 5 7SJ86 ( CP300) (versiones &lt; V9.50), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SK85 (CP200) (Todas las versiones), SIPROTEC 5 7SK85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SL86 (CP200) (Todas las versiones), SIPROTEC 5 7SL86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SL87 (CP200) (Todas las versiones), SIPROTEC 5 7SL87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SS85 (CP200) (Todas las versiones), SIPROTEC 5 7SS85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7ST85 (CP200) (Todas las versiones), SIPROTEC 5 7ST85 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7ST86 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7SX82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SX85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UM85 (CP300) (versiones &lt; V9. 50), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7UT85 (CP200) (Todas las versiones), SIPROTEC 5 7UT85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UT86 (CP200) (Todas las versiones), SIPROTEC 5 7UT86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UT87 (CP200) (Todas las versiones), SIPROTEC 5 7UT87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VE85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VK87 (CP200) (Todas las versiones), SIPROTEC 5 7VK87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VU85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (versiones &lt; V9.50 instaladas en dispositivos CP150 y CP300), SIPROTEC 5 Communication Module ETH-BA-2EL (Todas las versiones instaladas en dispositivos CP100 y CP200), SIPROTEC 5 Communication Module ETH-BB-2FO (versiones &lt; V9.50 instaladas en dispositivos CP150 y CP300), SIPROTEC 5 Communication Module ETH-BB-2FO (Todas las versiones instaladas en dispositivos CP100 y CP200) , SIPROTEC 5 Communication Module ETH-BD-2FO (versiones &lt; V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (versiones &lt; V9.50). Los dispositivos afectados no restringen adecuadamente las renegociaciones seguras iniciadas por el cliente dentro de los protocolos SSL y TLS. Esto podría permitir a un atacante crear una condición de denegación de servicio en los puertos 443/tcp y 4443/tcp mientras dure el ataque. • https://cert-portal.siemens.com/productcert/html/ssa-552874.html https://cert-portal.siemens.com/productcert/pdf/ssa-552874.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 5%CPEs: 72EXPL: 0

Wind River VxWorks 6.7 though 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 3 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion during connect() to a remote host. Wind River VxWorks versiones 6.7 hasta 6.9 y vx7, presenta un Desbordamiento de Búfer en el componente TCP (problema 3 de 4). Se trata de una vulnerabilidad de seguridad de IPNET: Confusión de estado de TCP Urgent Pointer durante la función connect() a un host remoto. • https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009 https://security.netapp.com/advisory/ntap-20190802-0001 https://support.f5.com/csp/article/K41190253 https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12261 https://support2.windriver.com/index.php?page=security-notices&# • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 24%CPEs: 72EXPL: 0

Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 2 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion caused by a malformed TCP AO option. Wind River VxWorks versiones 6.9 y vx7, presenta un Desbordamiento de Búfer en el componente TCP (problema 2 de 4). Se trata de una vulnerabilidad de seguridad de IPNET: Confusión de estado de TCP Urgent Pointer causada por una opción AO de TCP malformada. • https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009 https://security.netapp.com/advisory/ntap-20190802-0001 https://support.f5.com/csp/article/K41190253 https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12260 https://support2.windriver.com/index.php?page=security-notices&# • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 8%CPEs: 71EXPL: 0

Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options. Wind River VxWorks versiones 6.6 hasta vx7, presenta una Fijación de Sesión en el componente TCP. Se trata de una vulnerabilidad de seguridad de IPNET: DoS de la conexión TCP por medio de opciones TCP malformadas. • https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009 https://security.netapp.com/advisory/ntap-20190802-0001 https://support.f5.com/csp/article/K41190253 https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12258 https://support2.windriver.com/index.php?page=security-notices&# • CWE-384: Session Fixation •