ID

VAR-201807-2192


CVE

CVE-2018-4856


TITLE

SICLOCK TC100 and SICLOCK TC400 Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2018-007789

DESCRIPTION

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with administrative access to the device's management interface could lock out legitimate users. Manual interaction is required to restore the access of legitimate users. SICLOCK TC100 and SICLOCK TC400 Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. The SICROCK product line offers components for synchronizing plant and system time. The Siemens SICLOCK TC product has a bypass certification vulnerability. Siemens SICLOCK TC Devices are prone to the following multiple security vulnerabilities: 1. A denial-of-Service vulnerability 2. An authentication-bypass vulnerability 3. A remote code-execution vulnerability 4. Multiple security-bypass vulnerabilities 5. An information-disclosure vulnerability Exploiting these issues could allow an attacker to bypass authentication mechanism, obtain sensitive information, execute arbitrary code and perform unauthorized actions. Failed exploits can result in a denial-of-service condition. Both Siemens SICLOCK TC100 and SICLOCK TC400 are central clock products of Germany's Siemens (Siemens). This product can provide unified and accurate time information for all network nodes in the LAN. A security vulnerability exists in Siemens SICLOCK TC100 and SICLOCK TC400

Trust: 2.7

sources: NVD: CVE-2018-4856 // JVNDB: JVNDB-2018-007789 // CNVD: CNVD-2018-12506 // BID: 104672 // IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1 // VULHUB: VHN-134887

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1 // CNVD: CNVD-2018-12506

AFFECTED PRODUCTS

vendor:siemensmodel:siclock tc400scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:siclock tc100scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:siclock tc100scope: - version: -

Trust: 1.4

vendor:siemensmodel:siclock tc400scope: - version: -

Trust: 1.4

vendor:siemensmodel:siclock tc400scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siclock tc100scope:eqversion:0

Trust: 0.3

vendor:siclock tc400model: - scope:eqversion: -

Trust: 0.2

vendor:siclock tc100model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1 // CNVD: CNVD-2018-12506 // BID: 104672 // JVNDB: JVNDB-2018-007789 // CNNVD: CNNVD-201807-163 // NVD: CVE-2018-4856

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4856
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-4856
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-12506
value: LOW

Trust: 0.6

CNNVD: CNNVD-201807-163
value: MEDIUM

Trust: 0.6

IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-134887
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4856
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-12506
severity: LOW
baseScore: 3.3
vectorString: AV:N/AC:L/AU:M/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1
severity: LOW
baseScore: 3.3
vectorString: AV:N/AC:L/AU:M/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-134887
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4856
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1 // CNVD: CNVD-2018-12506 // VULHUB: VHN-134887 // JVNDB: JVNDB-2018-007789 // CNNVD: CNNVD-201807-163 // NVD: CVE-2018-4856

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-134887 // JVNDB: JVNDB-2018-007789 // NVD: CVE-2018-4856

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-163

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201807-163

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007789

PATCH

title:SSA-197012url:https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf

Trust: 0.8

title:Siemens SICLOCK TC product bypasses the patch for certification vulnerability (CNVD-2018-12506)url:https://www.cnvd.org.cn/patchInfo/show/133427

Trust: 0.6

sources: CNVD: CNVD-2018-12506 // JVNDB: JVNDB-2018-007789

EXTERNAL IDS

db:NVDid:CVE-2018-4856

Trust: 3.6

db:SIEMENSid:SSA-197012

Trust: 2.6

db:BIDid:104672

Trust: 2.0

db:CNNVDid:CNNVD-201807-163

Trust: 0.9

db:CNVDid:CNVD-2018-12506

Trust: 0.8

db:JVNDBid:JVNDB-2018-007789

Trust: 0.8

db:IVDid:E2F68B70-39AB-11E9-BEA6-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-134887

Trust: 0.1

sources: IVD: e2f68b70-39ab-11e9-bea6-000c29342cb1 // CNVD: CNVD-2018-12506 // VULHUB: VHN-134887 // BID: 104672 // JVNDB: JVNDB-2018-007789 // CNNVD: CNNVD-201807-163 // NVD: CVE-2018-4856

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf

Trust: 2.6

url:http://www.securityfocus.com/bid/104672

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4856

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4856

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2018-12506 // VULHUB: VHN-134887 // BID: 104672 // JVNDB: JVNDB-2018-007789 // CNNVD: CNNVD-201807-163 // NVD: CVE-2018-4856

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 104672

SOURCES

db:IVDid:e2f68b70-39ab-11e9-bea6-000c29342cb1
db:CNVDid:CNVD-2018-12506
db:VULHUBid:VHN-134887
db:BIDid:104672
db:JVNDBid:JVNDB-2018-007789
db:CNNVDid:CNNVD-201807-163
db:NVDid:CVE-2018-4856

LAST UPDATE DATE

2024-11-23T22:17:24.465000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-12506date:2018-07-04T00:00:00
db:VULHUBid:VHN-134887date:2019-10-09T00:00:00
db:BIDid:104672date:2018-07-03T00:00:00
db:JVNDBid:JVNDB-2018-007789date:2018-09-26T00:00:00
db:CNNVDid:CNNVD-201807-163date:2019-10-17T00:00:00
db:NVDid:CVE-2018-4856date:2024-11-21T04:07:35.793

SOURCES RELEASE DATE

db:IVDid:e2f68b70-39ab-11e9-bea6-000c29342cb1date:2018-07-04T00:00:00
db:CNVDid:CNVD-2018-12506date:2018-07-04T00:00:00
db:VULHUBid:VHN-134887date:2018-07-03T00:00:00
db:BIDid:104672date:2018-07-03T00:00:00
db:JVNDBid:JVNDB-2018-007789date:2018-09-26T00:00:00
db:CNNVDid:CNNVD-201807-163date:2018-07-04T00:00:00
db:NVDid:CVE-2018-4856date:2018-07-03T14:29:00.477