First published: Thu Mar 29 2018(Updated: )
A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tim 1531 Irc Firmware | <1.1 | |
Siemens Tim 1531 Irc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-4841 is critical with a severity value of 9.8.
The affected software for CVE-2018-4841 is Siemens Tim 1531 Irc Firmware versions up to exclusive 1.1.
A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication.
Successful exploitation of CVE-2018-4841 could allow a denial-of-service attack or unauthorized access to the device.
You can find more information about CVE-2018-4841 at the following references: [http://www.securityfocus.com/bid/103576](http://www.securityfocus.com/bid/103576) and [https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf)