ID

VAR-201912-1256


CVE

CVE-2019-18290


TITLE

SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing

Trust: 0.8

sources: JVNDB: JVNDB-2019-013214

DESCRIPTION

A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants

Trust: 2.43

sources: NVD: CVE-2019-18290 // JVNDB: JVNDB-2019-013214 // CNVD: CNVD-2019-45410 // IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // VULMON: CVE-2019-18290

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // CNVD: CNVD-2019-45410

AFFECTED PRODUCTS

vendor:siemensmodel:sppa-t3000 ms3000 migration serverscope: - version: -

Trust: 1.4

vendor:siemensmodel:sppa-t3000 ms3000 migration serverscope:eqversion:*

Trust: 1.0

vendor:sppa t3000 ms3000 migration servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // CNVD: CNVD-2019-45410 // JVNDB: JVNDB-2019-013214 // NVD: CVE-2019-18290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-18290
value: HIGH

Trust: 1.0

NVD: CVE-2019-18290
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-45410
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201912-602
value: HIGH

Trust: 0.6

IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5
value: HIGH

Trust: 0.2

VULMON: CVE-2019-18290
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-18290
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-45410
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-18290
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-18290
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // CNVD: CNVD-2019-45410 // VULMON: CVE-2019-18290 // JVNDB: JVNDB-2019-013214 // CNNVD: CNNVD-201912-602 // NVD: CVE-2019-18290

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.8

problemtype:CWE-122

Trust: 1.0

sources: JVNDB: JVNDB-2019-013214 // NVD: CVE-2019-18290

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-602

TYPE

Buffer error

Trust: 0.8

sources: IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // CNNVD: CNNVD-201912-602

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013214

PATCH

title:SSA-451445url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 0.8

title:Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45410)url:https://www.cnvd.org.cn/patchInfo/show/194211

Trust: 0.6

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=abc44ea961d2d15de1d1eca8d6f07d8a

Trust: 0.1

sources: CNVD: CNVD-2019-45410 // VULMON: CVE-2019-18290 // JVNDB: JVNDB-2019-013214

EXTERNAL IDS

db:NVDid:CVE-2019-18290

Trust: 3.4

db:SIEMENSid:SSA-451445

Trust: 2.3

db:PACKETSTORMid:155665

Trust: 1.8

db:ICS CERTid:ICSA-19-351-02

Trust: 1.4

db:CNVDid:CNVD-2019-45410

Trust: 0.8

db:CNNVDid:CNNVD-201912-602

Trust: 0.8

db:JVNDBid:JVNDB-2019-013214

Trust: 0.8

db:AUSCERTid:ESB-2019.4705

Trust: 0.6

db:IVDid:176077D8-0562-455E-9F56-D1C3B287E9A5

Trust: 0.2

db:VULMONid:CVE-2019-18290

Trust: 0.1

sources: IVD: 176077d8-0562-455e-9f56-d1c3b287e9a5 // CNVD: CNVD-2019-45410 // VULMON: CVE-2019-18290 // JVNDB: JVNDB-2019-013214 // PACKETSTORM: 155665 // CNNVD: CNNVD-201912-602 // NVD: CVE-2019-18290

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 2.3

url:http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-18290

Trust: 1.5

url:https://www.us-cert.gov/ics/advisories/icsa-19-351-02

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18290

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.4705/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://cert-portal.siemens.com/productcert/txt/ssa-451445.txt

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18303

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18306

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18301

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18287

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18294

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4832

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18299

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18300

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18286

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18298

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18304

Trust: 0.1

sources: CNVD: CNVD-2019-45410 // VULMON: CVE-2019-18290 // JVNDB: JVNDB-2019-013214 // PACKETSTORM: 155665 // CNNVD: CNNVD-201912-602 // NVD: CVE-2019-18290

CREDITS

Gleb Gritsai

Trust: 0.6

sources: CNNVD: CNNVD-201912-602

SOURCES

db:IVDid:176077d8-0562-455e-9f56-d1c3b287e9a5
db:CNVDid:CNVD-2019-45410
db:VULMONid:CVE-2019-18290
db:JVNDBid:JVNDB-2019-013214
db:PACKETSTORMid:155665
db:CNNVDid:CNNVD-201912-602
db:NVDid:CVE-2019-18290

LAST UPDATE DATE

2024-11-23T21:36:20.351000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-45410date:2019-12-16T00:00:00
db:VULMONid:CVE-2019-18290date:2022-03-04T00:00:00
db:JVNDBid:JVNDB-2019-013214date:2019-12-26T00:00:00
db:CNNVDid:CNNVD-201912-602date:2022-02-25T00:00:00
db:NVDid:CVE-2019-18290date:2024-11-21T04:32:59.090

SOURCES RELEASE DATE

db:IVDid:176077d8-0562-455e-9f56-d1c3b287e9a5date:2019-12-16T00:00:00
db:CNVDid:CNVD-2019-45410date:2019-12-16T00:00:00
db:VULMONid:CVE-2019-18290date:2019-12-12T00:00:00
db:JVNDBid:JVNDB-2019-013214date:2019-12-23T00:00:00
db:PACKETSTORMid:155665date:2019-12-13T15:10:44
db:CNNVDid:CNNVD-201912-602date:2019-12-12T00:00:00
db:NVDid:CVE-2019-18290date:2019-12-12T19:15:15.997