HIGH · 8.8

CVE-2018-4854

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on th...

Vulnerability Description

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.

CVSS Score

8.8

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
SiemensSiclock Tc400 Firmware-
SiemensSiclock Tc400-
SiemensSiclock Tc100 Firmware-
SiemensSiclock Tc100-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-4854?

CVE-2018-4854 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on th...

How severe is CVE-2018-4854?

CVE-2018-4854 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-4854?

Check the references section above for vendor advisories and patch information. Affected products include: Siemens Siclock Tc400 Firmware, Siemens Siclock Tc400, Siemens Siclock Tc100 Firmware, Siemens Siclock Tc100.