A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
6md85
Subscribe
6md86
Subscribe
6md89
Subscribe
7sa82
Subscribe
7sa86
Subscribe
7sa87
Subscribe
7sd82
Subscribe
7sd86
Subscribe
7sd87
Subscribe
7sj82
Subscribe
7sj85
Subscribe
7sj86
Subscribe
7sk82
Subscribe
7sk85
Subscribe
7sl82
Subscribe
7sl86
Subscribe
7sl87
Subscribe
7um85
Subscribe
7ut82
Subscribe
7ut85
Subscribe
7ut86
Subscribe
7ut87
Subscribe
7ve85
Subscribe
7vk87
Subscribe
Digsi 5 Engineering Software
Subscribe
Siprotec 5 Digsi Device Driver
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-2644 | A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-04T22:40:15.221Z
Reserved: 2019-04-08T00:00:00
Link: CVE-2019-10930
No data.
Status : Modified
Published: 2019-07-11T22:15:11.560
Modified: 2024-11-21T04:20:10.640
Link: CVE-2019-10930
No data.
OpenCVE Enrichment
No data.
EUVD