A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104672 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/104672 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf | Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 04:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/104672 - Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf - Mitigation, Vendor Advisory |
Information
Published : 2018-07-03 14:29
Updated : 2024-11-21 04:07
NVD link : CVE-2018-4851
Mitre link : CVE-2018-4851
CVE.ORG link : CVE-2018-4851
JSON object : View
Products Affected
siemens
- siclock_tc100
- siclock_tc400_firmware
- siclock_tc400
- siclock_tc100_firmware