Severity | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE ID | CVE-2018-13801 CVE-2018-13802 |
CVSSv3 |
7.7 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 6.3 [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] |
CWE ID |
CWE-269 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
ROX II |
Vulnerable software versions |
ROX II - |
Vendor URL | Siemens |
The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper privilege management. A remote attacker with network access to Port 22/TCP and valid low-privileged user credentials can gain root privileges.
RemediationUpdate to version 2.12.1.
External linkshttps://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf
The vulnerability allows a remote high-privileged attacker to execute arbitrary commands with elevated privileges on the target system.
The vulnerability exists due to improper privilege management. A remote attacker with a high-privileged user account access via SSH interface in on Port 22/TCP can circumvent restrictions and execute arbitrary operating system commands.
RemediationUpdate to version 2.12.1.
External linkshttps://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf