A vulnerability has been identified in Automation License Manager 5 (All versions < 5.3.4.4). An attacker with network access to the device could send specially crafted network packets to determine whether or not a network port on another remote system is accessible or not. This allows the attacker to do basic network scanning using the victims machine. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges, no user interaction is required. The impact is limited to determining whether or not a port on a target system is accessible by the affected device.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-3487 A vulnerability has been identified in Automation License Manager 5 (All versions < 5.3.4.4). An attacker with network access to the device could send specially crafted network packets to determine whether or not a network port on another remote system is accessible or not. This allows the attacker to do basic network scanning using the victims machine. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges, no user interaction is required. The impact is limited to determining whether or not a port on a target system is accessible by the affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-05T08:10:14.363Z

Reserved: 2018-05-25T00:00:00

Link: CVE-2018-11456

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-07T15:29:00.607

Modified: 2024-11-21T03:43:24.340

Link: CVE-2018-11456

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses