A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf - Vendor Advisory |
Information
Published : 2020-04-14 20:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10939
Mitre link : CVE-2019-10939
CVE.ORG link : CVE-2019-10939
JSON object : View
Products Affected
siemens
- tim_3v-ie
- tim_3v-ie_dnp3_firmware
- tim_4r-ie_dnp3_firmware
- tim_3v-ie_advanced
- tim_3v-ie_advanced_firmware
- tim_3v-ie_dnp3
- tim_4r-ie
- tim_4r-ie_dnp3
- tim_3v-ie_firmware
- tim_4r-ie_firmware
CWE