Vulnerability Description
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Siclock Tc400 Firmware | - |
| Siemens | Siclock Tc400 | - |
| Siemens | Siclock Tc100 Firmware | - |
| Siemens | Siclock Tc100 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104672Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdfMitigationVendor Advisory
- http://www.securityfocus.com/bid/104672Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdfMitigationVendor Advisory
FAQ
What is CVE-2018-4851?
CVE-2018-4851 is a vulnerability with a CVSS score of 8.2 (HIGH). A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending...
How severe is CVE-2018-4851?
CVE-2018-4851 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-4851?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Siclock Tc400 Firmware, Siemens Siclock Tc400, Siemens Siclock Tc100 Firmware, Siemens Siclock Tc100.