First published: Tue Jul 03 2018(Updated: )
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with administrative access to the device's management interface could lock out legitimate users. Manual interaction is required to restore the access of legitimate users.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Siclock Tc400 Firmware | ||
Siemens Siclock Tc400 | ||
Siemens Siclock Tc100 Firmware | ||
Siemens Siclock Tc100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4856 is considered a critical vulnerability as it allows an attacker with administrative access to lock out legitimate users.
To fix CVE-2018-4856, authorized personnel must manually restore access for legitimate users following a lockout.
CVE-2018-4856 affects all versions of Siemens SICLOCK TC100 and TC400 firmware.
The consequences of CVE-2018-4856 include unauthorized access control, resulting in a lockout of legitimate users from the device.
Currently, there is no specific patch for CVE-2018-4856, but restoring access requires manual intervention by administrators.