HIGH · 8.2

CVE-2018-4851

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending...

Vulnerability Description

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.

CVSS Score

8.2

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
HIGH

Affected Products

VendorProductVersions
SiemensSiclock Tc400 Firmware-
SiemensSiclock Tc400-
SiemensSiclock Tc100 Firmware-
SiemensSiclock Tc100-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-4851?

CVE-2018-4851 is a vulnerability with a CVSS score of 8.2 (HIGH). A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending...

How severe is CVE-2018-4851?

CVE-2018-4851 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-4851?

Check the references section above for vendor advisories and patch information. Affected products include: Siemens Siclock Tc400 Firmware, Siemens Siclock Tc400, Siemens Siclock Tc100 Firmware, Siemens Siclock Tc100.