Vulnerability Description
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Siclock Tc400 Firmware | - |
| Siemens | Siclock Tc400 | - |
| Siemens | Siclock Tc100 Firmware | - |
| Siemens | Siclock Tc100 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104672Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdfMitigationVendor Advisory
- http://www.securityfocus.com/bid/104672Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdfMitigationVendor Advisory
FAQ
What is CVE-2018-4854?
CVE-2018-4854 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on th...
How severe is CVE-2018-4854?
CVE-2018-4854 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-4854?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Siclock Tc400 Firmware, Siemens Siclock Tc400, Siemens Siclock Tc100 Firmware, Siemens Siclock Tc100.