A vulnerability has been identified in TIM 1531 IRC (All version < V2.0). The devices was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106194 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf | Vendor Advisory |
http://www.securityfocus.com/bid/106194 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106194 - Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf - Vendor Advisory |
Information
Published : 2018-12-12 16:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-13816
Mitre link : CVE-2018-13816
CVE.ORG link : CVE-2018-13816
JSON object : View
Products Affected
siemens
- tim_1531_irc
- tim_1531_irc_firmware