First published: Tue Jul 03 2018(Updated: )
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Siclock Tc400 Firmware | ||
Siemens Siclock Tc400 | ||
Siemens Siclock Tc100 Firmware | ||
Siemens Siclock Tc100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4851 has a severity rating that indicates a potential Denial-of-Service condition that could disrupt service.
To address CVE-2018-4851, implement network access controls and monitor for suspicious packet transmissions to the device.
CVE-2018-4851 affects all versions of SICLOCK TC100 and SICLOCK TC400 products.
CVE-2018-4851 can cause potential reboots of the device, leading to service interruptions.
The vendor associated with CVE-2018-4851 is Siemens.