// For flags

CVE-2018-4833

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.

Se ha identificado una vulnerabilidad en RFID 181-EIP (Todas las versiones), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), familia de switches SCALANCE X-200 (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a la V5.2.3), familia de switches SCALANCE X-200IRT (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a V5.4.1), familia de switches SCALANCE X-200RNA (Todas las versiones anteriores a la V3.2.6), familia de switches SCALANCE X-300 (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a la V4.1.3), SCALANCE X408 (Todas las versiones anteriores a la V4.1.3), SCALANCE X414 (Todas las versiones), SIMATIC RF182C (Todas las versiones). Los atacantes remotos no privilegiados ubicados en el mismo segmento de red local (capa 2 de OSI) podrían obtener la ejecución remota de código en los productos afectados enviando una respuesta DHCP especialmente diseñada a la solicitud DHCP de un cliente.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-02 CVE Reserved
  • 2018-06-14 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-10-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-122: Heap-based Buffer Overflow
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Rfid 181-eip Firmware
Search vendor "Siemens" for product "Rfid 181-eip Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Rfid 181-eip
Search vendor "Siemens" for product "Rfid 181-eip"
--
Safe
Siemens
Search vendor "Siemens"
Ruggedcom Wimax Firmware
Search vendor "Siemens" for product "Ruggedcom Wimax Firmware"
4.4
Search vendor "Siemens" for product "Ruggedcom Wimax Firmware" and version "4.4"
-
Affected
in Siemens
Search vendor "Siemens"
Ruggedcom Wimax
Search vendor "Siemens" for product "Ruggedcom Wimax"
--
Safe
Siemens
Search vendor "Siemens"
Ruggedcom Wimax Firmware
Search vendor "Siemens" for product "Ruggedcom Wimax Firmware"
4.5
Search vendor "Siemens" for product "Ruggedcom Wimax Firmware" and version "4.5"
-
Affected
in Siemens
Search vendor "Siemens"
Ruggedcom Wimax
Search vendor "Siemens" for product "Ruggedcom Wimax"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X200 Firmware
Search vendor "Siemens" for product "Scalance X200 Firmware"
< 5.2.3
Search vendor "Siemens" for product "Scalance X200 Firmware" and version " < 5.2.3"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance X200
Search vendor "Siemens" for product "Scalance X200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X200irt Firmware
Search vendor "Siemens" for product "Scalance X200irt Firmware"
< 5.4.1
Search vendor "Siemens" for product "Scalance X200irt Firmware" and version " < 5.4.1"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance X200irt
Search vendor "Siemens" for product "Scalance X200irt"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X204rna Firmware
Search vendor "Siemens" for product "Scalance X204rna Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Scalance X204rna
Search vendor "Siemens" for product "Scalance X204rna"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X300 Firmware
Search vendor "Siemens" for product "Scalance X300 Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Scalance X300
Search vendor "Siemens" for product "Scalance X300"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X408 Firmware
Search vendor "Siemens" for product "Scalance X408 Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Scalance X408
Search vendor "Siemens" for product "Scalance X408"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X414 Firmware
Search vendor "Siemens" for product "Scalance X414 Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Scalance X414
Search vendor "Siemens" for product "Scalance X414"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Rf182c Firmware
Search vendor "Siemens" for product "Simatic Rf182c Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Simatic Rf182c
Search vendor "Siemens" for product "Simatic Rf182c"
--
Safe