CVE-2018-4841

A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
References
Link Resource
http://www.securityfocus.com/bid/103576 Broken Link Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf Vendor Advisory
http://www.securityfocus.com/bid/103576 Broken Link Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:07

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103576 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103576 - Broken Link, Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf - Vendor Advisory

Information

Published : 2018-03-29 13:29

Updated : 2024-11-21 04:07


NVD link : CVE-2018-4841

Mitre link : CVE-2018-4841

CVE.ORG link : CVE-2018-4841


JSON object : View

Products Affected

siemens

  • tim_1531_irc
  • tim_1531_irc_firmware
CWE
CWE-303

Incorrect Implementation of Authentication Algorithm

CWE-287

Improper Authentication