// For flags

CVE-2018-4838

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in EN100 Ethernet module IEC 61850 variant (All versions < V4.30), EN100 Ethernet module DNP3 variant (All versions < V1.04), EN100 Ethernet module PROFINET IO variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module IEC 104 variant (All versions < V1.22). The web interface (TCP/80) of affected devices allows an unauthenticated user to upgrade or downgrade the firmware of the device, including to older versions with known vulnerabilities.

Se ha identificado una vulnerabilidad en la variante del módulo de Ethernet EN100 IEC 61850 (todas las versiones anteriores a la V4.30), la variante del módulo de Ethernet EN100 DNP3 (todas las versiones anteriores a la V1.04), la variante del módulo de Ethernet EN100 PROFINET IO (todas las versiones), la variante del módulo de Ethernet EN100 Modbus TCP (todas las versiones) y la variante del módulo de Ethernet EN100 IEC 104 (todas las versiones anteriores a la V1.22). La interfaz web (TCP/80) de los dispositivos afectados permite que un usuario no autenticado actualice o degrade el firmware del dispositivo, incluyendo versiones más antiguas con vulnerabilidades conocidas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-02 CVE Reserved
  • 2018-03-08 CVE Published
  • 2024-01-16 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
En100 Ethernet Module Iec 104 Firmware
Search vendor "Siemens" for product "En100 Ethernet Module Iec 104 Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
En100 Ethernet Module Iec 104
Search vendor "Siemens" for product "En100 Ethernet Module Iec 104"
--
Safe
Siemens
Search vendor "Siemens"
En100 Ethernet Module Dnp3 Firmware
Search vendor "Siemens" for product "En100 Ethernet Module Dnp3 Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
En100 Ethernet Module Dnp3
Search vendor "Siemens" for product "En100 Ethernet Module Dnp3"
--
Safe
Siemens
Search vendor "Siemens"
En100 Ethernet Module Modbus Tcp Firmware
Search vendor "Siemens" for product "En100 Ethernet Module Modbus Tcp Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
En100 Ethernet Module Modbus Tcp
Search vendor "Siemens" for product "En100 Ethernet Module Modbus Tcp"
--
Safe
Siemens
Search vendor "Siemens"
En100 Ethernet Module Profinet Io Firmware
Search vendor "Siemens" for product "En100 Ethernet Module Profinet Io Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
En100 Ethernet Module Profinet Io
Search vendor "Siemens" for product "En100 Ethernet Module Profinet Io"
--
Safe
Siemens
Search vendor "Siemens"
En100 Ethernet Module Iec 61850 Firmware
Search vendor "Siemens" for product "En100 Ethernet Module Iec 61850 Firmware"
< 4.30
Search vendor "Siemens" for product "En100 Ethernet Module Iec 61850 Firmware" and version " < 4.30"
-
Affected
in Siemens
Search vendor "Siemens"
En100 Ethernet Module Iec 61850
Search vendor "Siemens" for product "En100 Ethernet Module Iec 61850"
--
Safe