First published: Thu Jan 25 2018(Updated: )
A vulnerability has been identified in TeleControl Server Basic < V3.1. An authenticated attacker with a low-privileged account to the TeleControl Server Basic's port 8000/tcp could escalate his privileges and perform administrative operations.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Telecontrol Server Basic | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-4836 is high.
An authenticated attacker with a low-privileged account can exploit CVE-2018-4836 by accessing TeleControl Server Basic's port 8000/tcp and escalating their privileges to perform administrative operations.
The affected software of CVE-2018-4836 is Siemens Telecontrol Server Basic with a version up to but not including 3.1.
Yes, the following references are available for CVE-2018-4836: [link1](http://www.securityfocus.com/bid/102897), [link2](http://www.securityfocus.com/bid/102904), [link3](https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-651454.pdf).
The Common Weakness Enumeration (CWE) identifier for CVE-2018-4836 is CWE-287.