CVE-2018-11464
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to cause a Denial-of-Service condition of the VNC server. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known.
Se ha identificado una vulnerabilidad en SINUMERIK 828D V4.7 (todas las versiones anteriores a la V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (todas las versiones anteriores a la V4.7 SP6 HF5) y SINUMERIK 840D sl V4.8 (todas las versiones anteriores a la V4.8 SP3). El servidor VNC integrado en el puerto 5900/tcp de los productos afectados podría permitir que un atacante remoto provoque una condición de denegación de servicio (DoS) en el servidor VNC. Nótese que esta vulnerabilidad solo puede explotarse si el puerto 5900/tcp se abre manualmente en la configuración de firewall del puerto de red X130. Esta vulnerabilidad podría ser explotada por atacantes con acceso a los sistemas y puertos afectados. Su explotación con éxito no requiere privilegios de usuario ni interacción. Esta vulnerabilidad podría permitir que un atacante comprometa la disponibilidad del servidor VNC. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-05-25 CVE Reserved
- 2018-12-12 CVE Published
- 2024-08-05 CVE Updated
- 2024-10-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-248: Uncaught Exception
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106185 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-170881.pdf | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Sinumerik 828d Firmware Search vendor "Siemens" for product "Sinumerik 828d Firmware" | <= 4.7 Search vendor "Siemens" for product "Sinumerik 828d Firmware" and version " <= 4.7" | - |
Affected
| in | Siemens Search vendor "Siemens" | Sinumerik 828d Search vendor "Siemens" for product "Sinumerik 828d" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Sinumerik 840d Sl Firmware Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" | <= 4.7 Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" and version " <= 4.7" | - |
Affected
| in | Siemens Search vendor "Siemens" | Sinumerik 840d Sl Search vendor "Siemens" for product "Sinumerik 840d Sl" | * | - |
Safe
|
Siemens Search vendor "Siemens" | Sinumerik 840d Sl Firmware Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" | <= 4.8 Search vendor "Siemens" for product "Sinumerik 840d Sl Firmware" and version " <= 4.8" | - |
Affected
| in | Siemens Search vendor "Siemens" | Sinumerik 840d Sl Search vendor "Siemens" for product "Sinumerik 840d Sl" | - | - |
Safe
|