CVE-2012-1799
CVSS V2 High 10
CVSS V3 None
Description
The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password.
Overview
- CVE ID
- CVE-2012-1799
- Assigner
- cret@cert.org
- Vulnerability Status
- Modified
- Published Version
- 2012-04-18T10:33:34
- Last Modified Date
- 2012-12-06T04:18:02
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:siemens:scalance_s_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.3.0 | |
cpe:2.3:a:siemens:scalance_s_firmware:2.1.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:scalance_s_firmware:2.2.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:scalance_s602:v2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:scalance_s612:v2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:scalance_s613:v2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 10
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 10
References
Reference URL | Reference Tags |
---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf | US Government Resource |
http://support.automation.siemens.com/WW/view/en/59869684 | |
http://osvdb.org/81033 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2012-1799 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1799 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 10:48:38 | Added to TrackCVE |