// For flags

CVE-2018-11464

 

Severity Score

3.7
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to cause a Denial-of-Service condition of the VNC server. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known.

Se ha identificado una vulnerabilidad en SINUMERIK 828D V4.7 (todas las versiones anteriores a la V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (todas las versiones anteriores a la V4.7 SP6 HF5) y SINUMERIK 840D sl V4.8 (todas las versiones anteriores a la V4.8 SP3). El servidor VNC integrado en el puerto 5900/tcp de los productos afectados podría permitir que un atacante remoto provoque una condición de denegación de servicio (DoS) en el servidor VNC. Nótese que esta vulnerabilidad solo puede explotarse si el puerto 5900/tcp se abre manualmente en la configuración de firewall del puerto de red X130. Esta vulnerabilidad podría ser explotada por atacantes con acceso a los sistemas y puertos afectados. Su explotación con éxito no requiere privilegios de usuario ni interacción. Esta vulnerabilidad podría permitir que un atacante comprometa la disponibilidad del servidor VNC. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-05-25 CVE Reserved
  • 2018-12-12 CVE Published
  • 2024-05-04 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-248: Uncaught Exception
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Sinumerik 828d Firmware
Search vendor "Siemens" for product "Sinumerik 828d Firmware"
<= 4.7
Search vendor "Siemens" for product "Sinumerik 828d Firmware" and version " <= 4.7"
-
Affected
in Siemens
Search vendor "Siemens"
Sinumerik 828d
Search vendor "Siemens" for product "Sinumerik 828d"
--
Safe
Siemens
Search vendor "Siemens"
Sinumerik 840d Sl Firmware
Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware"
<= 4.7
Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" and version " <= 4.7"
-
Affected
in Siemens
Search vendor "Siemens"
Sinumerik 840d Sl
Search vendor "Siemens" for product "Sinumerik 840d Sl"
*-
Safe
Siemens
Search vendor "Siemens"
Sinumerik 840d Sl Firmware
Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware"
<= 4.8
Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" and version " <= 4.8"
-
Affected
in Siemens
Search vendor "Siemens"
Sinumerik 840d Sl
Search vendor "Siemens" for product "Sinumerik 840d Sl"
--
Safe