ID

VAR-201806-1776


CVE

CVE-2018-4861


TITLE

SIEMENS SCALANCE M875 Arbitrary File Download Vulnerability

Trust: 0.8

sources: IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // CNVD: CNVD-2018-11397

DESCRIPTION

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could potentially read and download arbitrary files from the device's file system. Successful exploitation requires that the attacker has network access to the web interface. The attacker must be authenticated as administrative user to exploit the security vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SCALANCE M875 Contains an information disclosure vulnerability.Information may be obtained. SCALANCEM Industrial Routers are used for secure remote access to factories via mobile networks, such as GPRS or UMTS, with integrated security features of the firewall to prevent unauthorized access and VPNs to protect data transmission. There is a security hole in SIEMENSSCALANCEM875. Siemens SCALANCE M875 is an industrial-grade mobile wireless router product of Siemens

Trust: 2.43

sources: NVD: CVE-2018-4861 // JVNDB: JVNDB-2018-007635 // CNVD: CNVD-2018-11397 // IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // VULHUB: VHN-134892

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // CNVD: CNVD-2018-11397

AFFECTED PRODUCTS

vendor:siemensmodel:scalance m875scope: - version: -

Trust: 1.2

vendor:siemensmodel:scalance m875scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:scalance m875scope:eqversion: -

Trust: 0.8

vendor:scalance m875model: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // CNVD: CNVD-2018-11397 // JVNDB: JVNDB-2018-007635 // CNNVD: CNNVD-201806-870 // NVD: CVE-2018-4861

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4861
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-4861
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-11397
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201806-870
value: MEDIUM

Trust: 0.6

IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-134892
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4861
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11397
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-134892
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4861
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // CNVD: CNVD-2018-11397 // VULHUB: VHN-134892 // JVNDB: JVNDB-2018-007635 // CNNVD: CNNVD-201806-870 // NVD: CVE-2018-4861

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:CWE-22

Trust: 1.0

sources: VULHUB: VHN-134892 // JVNDB: JVNDB-2018-007635 // NVD: CVE-2018-4861

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-870

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201806-870

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007635

PATCH

title:SSA-977428url:https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf

Trust: 0.8

title:SIEMENSSCALANCEM875 patch for arbitrary file download vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/131841

Trust: 0.6

title:Siemens SCALANCE M875 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80918

Trust: 0.6

sources: CNVD: CNVD-2018-11397 // JVNDB: JVNDB-2018-007635 // CNNVD: CNNVD-201806-870

EXTERNAL IDS

db:NVDid:CVE-2018-4861

Trust: 3.3

db:SIEMENSid:SSA-977428

Trust: 2.3

db:CNNVDid:CNNVD-201806-870

Trust: 0.9

db:CNVDid:CNVD-2018-11397

Trust: 0.8

db:JVNDBid:JVNDB-2018-007635

Trust: 0.8

db:IVDid:E2F3300F-39AB-11E9-8FC7-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-134892

Trust: 0.1

sources: IVD: e2f3300f-39ab-11e9-8fc7-000c29342cb1 // CNVD: CNVD-2018-11397 // VULHUB: VHN-134892 // JVNDB: JVNDB-2018-007635 // CNNVD: CNNVD-201806-870 // NVD: CVE-2018-4861

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4861

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4861

Trust: 0.8

sources: CNVD: CNVD-2018-11397 // VULHUB: VHN-134892 // JVNDB: JVNDB-2018-007635 // CNNVD: CNNVD-201806-870 // NVD: CVE-2018-4861

SOURCES

db:IVDid:e2f3300f-39ab-11e9-8fc7-000c29342cb1
db:CNVDid:CNVD-2018-11397
db:VULHUBid:VHN-134892
db:JVNDBid:JVNDB-2018-007635
db:CNNVDid:CNNVD-201806-870
db:NVDid:CVE-2018-4861

LAST UPDATE DATE

2024-11-23T22:00:28.369000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11397date:2018-06-13T00:00:00
db:VULHUBid:VHN-134892date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-007635date:2018-09-20T00:00:00
db:CNNVDid:CNNVD-201806-870date:2019-10-17T00:00:00
db:NVDid:CVE-2018-4861date:2024-11-21T04:07:36.333

SOURCES RELEASE DATE

db:IVDid:e2f3300f-39ab-11e9-8fc7-000c29342cb1date:2018-06-13T00:00:00
db:CNVDid:CNVD-2018-11397date:2018-06-13T00:00:00
db:VULHUBid:VHN-134892date:2018-06-26T00:00:00
db:JVNDBid:JVNDB-2018-007635date:2018-09-20T00:00:00
db:CNNVDid:CNNVD-201806-870date:2018-06-13T00:00:00
db:NVDid:CVE-2018-4861date:2018-06-26T18:29:01.010