Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 17 |
CVE-ID | CVE-2021-42379 CVE-2022-23395 CVE-2021-42386 CVE-2021-42385 CVE-2021-42384 CVE-2021-42383 CVE-2021-42382 CVE-2021-42381 CVE-2021-42380 CVE-2021-42378 CVE-2021-42377 CVE-2021-42376 CVE-2021-42375 CVE-2021-42374 CVE-2021-42373 CVE-2018-25032 CVE-2018-12886 |
CWE-ID | CWE-416 CWE-79 CWE-763 CWE-476 CWE-20 CWE-125 CWE-119 CWE-209 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
SCALANCE WUM766-1 (US) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WUM766-1 (EU) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WUM763-1 Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WAM766-1 EEC (US) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WAM766-1 EEC (EU) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WAM766-1 (US) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WAM766-1 (EU) Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE WAM763-1 Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU58692
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42379
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "next_input_file" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73786
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23395
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58678
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42386
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "nvalloc" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58683
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42385
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "evaluate" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58685
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42384
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "handle_special" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69654
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42383
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the awk applet. A remote privileged user can pass a specially crafted input to the application, trigger a use-after-free error and execute arbitrary code.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58684
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42382
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "getvar_s" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58673
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42381
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "hash_init" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58694
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42380
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "next_input_file" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58680
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42378
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the "getvar_i" function. A remote administrator can execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69653
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42377
CWE-ID:
CWE-763 - Release of invalid pointer or reference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker execute arbitrary code on the system.
The vulnerability exists due to improper input validation within the hush applet. A remote attacker can pass a specially crafted input to the application and potentially execute arbitrary shell commands.
Install update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59877
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42376
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in Busybox's hush applet when processing a crafted shell command with a \x03 delimiter character. A local user can pass specially crafted string to the affected applet and crash the application.
Install update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69652
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42375
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the ash applet. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58670
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42374
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "unlzma". A remote attacker can trigger out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69651
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42373
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the man applet when a section name is supplied but no page argument is given. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61671
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-25032
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73785
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-12886
CWE-ID:
CWE-209 - Information Exposure Through an Error Message
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSCALANCE WUM766-1 (US): before 2.0
SCALANCE WUM766-1 (EU): before 2.0
SCALANCE WUM763-1: before 2.0
SCALANCE WAM766-1 EEC (US): before 2.0
SCALANCE WAM766-1 EEC (EU): before 2.0
SCALANCE WAM766-1 (US): before 2.0
SCALANCE WAM766-1 (EU): before 2.0
SCALANCE WAM763-1: before 2.0
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-565386.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.