Vulnerabilites related to siemens - simotion_p320-4_s_firmware
Vulnerability from fkie_nvd
Published
2023-06-13 09:15
Modified
2024-11-21 07:52
Severity ?
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability has been identified in SIMOTION C240 (All versions >= V5.4 < V5.5 SP1), SIMOTION C240 PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D445-2 DP/PN (All versions >= V5.4), SIMOTION D445-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D455-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION P320-4 E (All versions >= V5.4), SIMOTION P320-4 S (All versions >= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device.
References
▶ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A65B54E-FE29-4352-8BA4-60C2F23F87F8", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "B6979F0F-FA12-422F-938D-0C84D39F69E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d425-2_dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD83F3F-CF11-44D9-8F9C-0B8D33BC3481", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50C77E0A-9C5D-43EA-9157-C94CF4ACBE98", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "35BA3146-E138-48C5-BAFB-36FF795C8591", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d425-2_dp\\/pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A007F9C-B6E3-4606-A7C2-B78E5F51C9BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "848DE61E-A4F9-4368-82AB-EA6FCD369EDB", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "EC2302CA-AD84-4FE8-98EA-7764A5B8978B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d435-2_dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "80932D46-6182-4B9D-9A66-BC381052DBF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE2ACB98-373C-471C-B5A7-8D1BE59BBDA7", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "AB781258-8A47-4388-A115-68ACF6CFD420", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d435-2_dp\\/pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3371CB24-AB41-44C7-93B7-78E2BD171D42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9B8C9F9-9474-4153-8CCA-60308E13543D", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "117C8E63-C09D-412C-9B68-F2C72A8CCEDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DC9044F0-7E54-4C66-8613-A440B71D9D0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\)_firmware:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B9D8FBD-E8E7-43E1-922F-973851E0D160", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "05D488BB-E0B5-46DF-B303-98524A39EEC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB06BE4-AA5C-4367-B34F-BB3FC17B9470", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "995B8740-C501-4448-9D22-4D115FAAE543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d455-2_dp\\/pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "53FBAAA1-4012-463D-864B-C7BEAE15093E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4_e_firmware:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "2C90B0F9-BBC8-417E-98FD-30BC069E769D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4_e:-:*:*:*:*:*:*:*", "matchCriteriaId": "80DFB571-E3FA-44AA-B81C-AC7E13FFCB01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4_s_firmware:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "D49AFE41-D93E-4488-A5CB-AC48BB5921D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4849FE93-67D0-496F-B47D-5035FF902540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91C51B40-4344-4796-AF7B-9F85D255A113", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "E2E25B36-BB4D-40B6-91A2-FC344E063B45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d410-2_dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2899391-D29A-4C95-A795-1B7EADCDF799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52950381-7B46-46F7-9B44-0313EA47EA87", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BFA771D3-A08F-4690-853D-F07B47EC83AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_d410-2_dp\\/pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C5013B-BE8F-4635-9F7E-006EE737A4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_c240_pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "625A4A2B-37BB-4534-B1DD-3B18862F97BC", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_c240_pn_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "2BE0D94D-FFF4-4913-9376-A3389579CC70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_c240_pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355A13D-6E84-4F35-8BE6-223C086E3719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_c240_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94035BD3-584A-4F93-A9AB-75A32F1628E2", "versionEndExcluding": "5.5", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simotion_c240_firmware:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "6E8FF00E-5125-4CD8-BD83-9F595ABA3B11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_c240:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B461ED-4B04-4EC2-B88E-F50D53509B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMOTION C240 (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION C240 PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D455-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION P320-4 E (All versions \u003e= V5.4), SIMOTION P320-4 S (All versions \u003e= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device." } ], "id": "CVE-2023-27465", "lastModified": "2024-11-21T07:52:57.883", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T09:15:16.557", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-213" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-02 14:59
Modified
2025-04-20 01:37
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
Impacted products
{ "cisaActionDue": "2022-07-28", "cisaExploitAdd": "2022-01-28", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hpe:proliant_ml10_gen9_server_firmware:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ABEA07C-9E91-4937-9F6C-A687B2F946A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "64EDAC0B-39A9-41FF-99AA-66A4422EFE53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6FF34-5C5C-485B-AC78-DE20BA01DAD5", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "124ED9B8-BA17-4204-BD5B-3F94558A6531", "versionEndExcluding": "11.0.26.3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E311214-74E6-449F-A446-B14A498D85E9", "versionEndExcluding": "21.01.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:-:*:*:*", "matchCriteriaId": "BCC01671-A79A-423E-BD61-9056AE5CD240", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:pro:*:*:*", "matchCriteriaId": "4B4A9C1C-6105-455B-9639-7EE02AF05B60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", "versionEndExcluding": "18.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8319D59A-6F4A-488D-B13F-90D70B448706", "versionEndExcluding": "22.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "190CD7FB-3FBA-4988-9759-7815BD1F5737", "versionEndExcluding": "21.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "60CEBBF4-221A-429E-8BE8-24899FFE6D36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CA84993-2A1C-4CDF-8AA3-BE5C95E7DFF8", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B7D8654-08B0-4FF8-907B-F081A8048C85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DB5E7FE-2FA2-429F-8A6C-5C3410562224", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB1974-66F4-4F6B-85AB-7FE4B1BEC2E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C", "versionEndExcluding": "11.0.26.3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBE04AF-9130-43DE-A1CC-2AC66F2209DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD13F29-4E0E-4AB4-AB37-130D4104AD8B", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF5275FF-588F-4337-97EF-A37522F07548", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6BDFA2C-7D39-4179-A00D-92552F269158", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "300E56DA-BB24-4877-8CF2-A049A979E31B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBA440D3-93A9-4681-AF0E-8667DCF24E4B", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE60199-D133-48EE-8124-6C798981E4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BC56331-2124-4446-94BD-EA6D551F193D", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "F75EE385-B1E7-4EC1-9383-73E1FA6F4AE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB6E29-CAA0-4EDB-9042-12B0C4D27558", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8D39EF6-86A9-49F4-899A-F21D8619F24D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB168E2D-A808-47D6-8B11-0308DAC118E8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BC2AE90-7015-483A-805C-5BB6E84CAF29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc427e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "791C710D-472C-492C-AB83-87EFDE57E557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "60CEBBF4-221A-429E-8BE8-24899FFE6D36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F9839B0-C214-4D84-AFD8-C5F9C14BEB4C", "versionEndExcluding": "11.0.26.3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBE04AF-9130-43DE-A1CC-2AC66F2209DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pcs_7_ipc477d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56443C42-C990-4316-871F-8E2DA650C06E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pcs_7_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F79553-5769-4814-B602-714F2E68A96A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60A4F35F-96D5-4750-8597-5C4E74C690DE", "versionEndExcluding": "21.01.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "310CC52F-1AE2-4319-93F5-185F492F2ABA", "versionEndExcluding": "17.02.06.83.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4849FE93-67D0-496F-B47D-5035FF902540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu_50.5-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A04BB605-3CD3-41FE-8CC6-F5D8B8650955", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD4D2787-FA10-4B06-BC00-B869FB16A424", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "C11D072B-B549-4352-B0E5-2E7C1923161E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EED42746-4191-4188-8BAD-4A23B4D6B242", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "52652BE3-F695-42FB-A6FF-4A51DBA6789B", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BD06FA87-E538-4492-9031-068CA05E63CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFFABA0B-46E6-4F2B-BA13-A48BF2587F68", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4290CDD9-8D27-46AD-BEFC-36827FA4A348", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "09936A93-41E2-4293-B88B-4B7ED4E6FD44", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8855E63-AE6C-44A7-A2FE-7E4791C69BD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E92AF85-322D-4587-B393-62172EA51D62", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF833CF3-0170-491D-AEDB-33003B35B47B", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C27CD90-E986-4A89-B63E-1E3D2C62FBB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "4B71755C-4B29-4947-A436-1658097CD3F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "86388428-3285-4BC8-B0F2-2049B07711F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." }, { "lang": "es", "value": "Un atacante de red sin privilegios podr\u00eda alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podr\u00eda aprovisionar caracter\u00edsticas de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT)." } ], "id": "CVE-2017-5689", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2017-05-02T14:59:00.520", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry", "Broken Link" ], "url": "http://www.securityfocus.com/bid/98269" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry", "Broken Link" ], "url": "http://www.securitytracker.com/id/1038385" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" }, { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory", "Broken Link" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "Broken Link" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "source": "secure@intel.com", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry", "Broken Link" ], "url": "http://www.securityfocus.com/bid/98269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry", "Broken Link" ], "url": "http://www.securitytracker.com/id/1038385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory", "Broken Link" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Broken Link" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
CVE-2017-5689 (GCVE-0-2017-5689)
Vulnerability from cvelistv5
Published
2017-05-02 14:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Escalation of Privilege
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability |
Version: fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038385" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-5689", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:43:44.728208Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-01-28", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5689" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:28.623Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-01-28T00:00:00+00:00", "value": "CVE-2017-5689 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later" } ] } ], "datePublic": "2017-05-01T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-10T14:06:25.000Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038385" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2017-5689", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", "version": { "version_data": [ { "version_value": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", "refsource": "MISC", "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "name": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", "refsource": "CONFIRM", "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038385" }, { "name": "https://security.netapp.com/advisory/ntap-20170509-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "name": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", "refsource": "MISC", "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://www.embedi.com/news/mythbusters-cve-2017-5689", "refsource": "MISC", "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5689", "datePublished": "2017-05-02T14:00:00.000Z", "dateReserved": "2017-02-01T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:28.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27465 (GCVE-0-2023-27465)
Vulnerability from cvelistv5
Published
2023-06-13 08:17
Modified
2024-08-02 12:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-213 - Exposure of Sensitive Information Due to Incompatible Policies
Summary
A vulnerability has been identified in SIMOTION C240 (All versions >= V5.4 < V5.5 SP1), SIMOTION C240 PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D445-2 DP/PN (All versions >= V5.4), SIMOTION D445-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D455-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION P320-4 E (All versions >= V5.4), SIMOTION P320-4 S (All versions >= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | SIMOTION C240 |
Version: All versions >= V5.4 < V5.5 SP1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:09:43.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMOTION C240", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION C240 PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D410-2 DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D410-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D425-2 DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D425-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D435-2 DP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D435-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D445-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D445-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D455-2 DP/PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4 \u003c V5.5 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION P320-4 E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION P320-4 S", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMOTION C240 (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION C240 PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D455-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION P320-4 E (All versions \u003e= V5.4), SIMOTION P320-4 S (All versions \u003e= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-213", "description": "CWE-213: Exposure of Sensitive Information Due to Incompatible Policies", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T08:17:06.765Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-27465", "datePublished": "2023-06-13T08:17:06.765Z", "dateReserved": "2023-03-01T17:29:31.289Z", "dateUpdated": "2024-08-02T12:09:43.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }