CVE-2012-3009
 
Severity Score
8.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Siemens COMOS before 9.1 Patch 413, 9.2 before Update 03 Patch 023, and 10.0 before Patch 005 allows remote authenticated users to obtain database administrative access via unspecified method calls.
Siemens COMOS antes de v9.1 Patch 413, v9.2 antes de Update 03 Patch 023 y v10.0 antes de Patch 005 permite a usuarios remotos autenticados obtener acceso a la base de datos administrativa a través de llamadas a métodos no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-05-30 CVE Reserved
- 2012-08-16 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-227-01.pdf | Us Government Resource |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Comos Search vendor "Siemens" for product "Comos" | <= 9.1 Search vendor "Siemens" for product "Comos" and version " <= 9.1" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Comos Search vendor "Siemens" for product "Comos" | 9.2 Search vendor "Siemens" for product "Comos" and version "9.2" | 03 |
Affected
| ||||||
Siemens Search vendor "Siemens" | Comos Search vendor "Siemens" for product "Comos" | 10.0 Search vendor "Siemens" for product "Comos" and version "10.0" | - |
Affected
|