CVE-2018-4841
moderate-risk
Published 2018-03-29
A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
Do I need to act?
~
3.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Tim 1531 Irc Firmware
Affected Vendors
References (4)
Broken Link
http://www.securityfocus.com/bid/103576
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf
Broken Link
http://www.securityfocus.com/bid/103576
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
7/34 · Low
Exposure
5/34 · Minimal