8.5
CVE-2018-4851
- EPSS 0.44%
- Published 03.07.2018 14:29:00
- Last modified 21.11.2024 04:07:35
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Siclock Tc400 Firmware Version-
Siemens ≫ Siclock Tc100 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.604 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.2 | 3.9 | 4.2 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
|
nvd@nist.gov | 8.5 | 10 | 7.8 |
AV:N/AC:L/Au:N/C:N/I:P/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.