First published: Thu Jun 14 2018(Updated: )
A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
siemens RFID 181-eip firmware | ||
siemens RFID 181-eip | ||
siemens RUGGEDCOM wimax firmware | =4.4 | |
siemens RUGGEDCOM wimax firmware | =4.5 | |
siemens RUGGEDCOM wimax | ||
Siemens Scalance X-200 Firmware | <5.2.3 | |
Siemens Scalance X200 | ||
siemens SCALANCE x200irt firmware | <5.4.1 | |
siemens SCALANCE x200irt | ||
Siemens Scalance X204RNA EEC Firmware | ||
Siemens Scalance X204RNA EEC | ||
Siemens Scalance X-300 Firmware | ||
Siemens Scalance X-300 Firmware | ||
Siemens Scalance X408 | ||
Siemens SCALANCE X408-2 | ||
Siemens Scalance X414 | ||
Siemens Scalance X414 Firmware | ||
Siemens Simatic RF182C | ||
Siemens SIMATIC RF182C (6GT2002-0JD10) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2018-4833.
The products affected by this vulnerability include RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA.
The severity of CVE-2018-4833 is high, with a severity value of 8.8.
To fix the vulnerability CVE-2018-4833, it is recommended to apply the necessary security patches provided by Siemens.
You can find more information about CVE-2018-4833 in the Siemens ProductCERT advisory.