A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Rfid 181-eip
Subscribe
Rfid 181-eip Firmware
Subscribe
Ruggedcom Wimax
Subscribe
Ruggedcom Wimax Firmware
Subscribe
Scalance X200
Subscribe
Scalance X200 Firmware
Subscribe
Scalance X200irt
Subscribe
Scalance X200irt Firmware
Subscribe
Scalance X204rna
Subscribe
Scalance X204rna Firmware
Subscribe
Scalance X300
Subscribe
Scalance X300 Firmware
Subscribe
Scalance X408
Subscribe
Scalance X408 Firmware
Subscribe
Scalance X414
Subscribe
Scalance X414 Firmware
Subscribe
Simatic Rf182c
Subscribe
Simatic Rf182c Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-16619 | A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-05T05:18:26.432Z
Reserved: 2018-01-02T00:00:00
Link: CVE-2018-4833
No data.
Status : Modified
Published: 2018-06-14T16:29:00.333
Modified: 2024-11-21T04:07:32.737
Link: CVE-2018-4833
No data.
OpenCVE Enrichment
No data.
EUVD