First published: Tue Jul 03 2018(Updated: )
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the firmware of the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Siclock Tc400 Firmware | ||
Siemens Siclock Tc400 | ||
Siemens Siclock Tc100 Firmware | ||
Siemens Siclock Tc100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-4853 is categorized as high due to an attacker being able to modify device firmware.
To fix CVE-2018-4853, ensure your devices are configured to restrict access to port 69/udp.
CVE-2018-4853 affects Siemens SICLOCK TC100 and TC400 firmware across all versions.
An attacker with network access can modify the firmware of Siemens SICLOCK devices.
Implementing strict network access controls can serve as a temporary workaround for CVE-2018-4853.