ID

VAR-202408-0012


CVE

CVE-2024-38878


TITLE

Siemens'  omnivise t3000 application server  Past traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-008314

DESCRIPTION

A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions). Affected devices allow authenticated users to export diagnostics data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download arbitrary files from the file system. Siemens' omnivise t3000 application server Exists in a past traversal vulnerability.Information may be obtained. Omnivise T3000 is a distributed control system used in fossil fuel and large renewable energy power plants

Trust: 2.16

sources: NVD: CVE-2024-38878 // JVNDB: JVNDB-2024-008314 // CNVD: CNVD-2024-35108

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-35108

AFFECTED PRODUCTS

vendor:siemensmodel:omnivise t3000 application serverscope:eqversion:r9.2

Trust: 1.0

vendor:シーメンスmodel:omnivise t3000 application serverscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:omnivise t3000 application serverscope:eqversion:r9.2

Trust: 0.8

vendor:シーメンスmodel:omnivise t3000 application serverscope:eqversion: -

Trust: 0.8

vendor:siemensmodel:omnivise t3000 application serverscope: - version: -

Trust: 0.6

vendor:siemensmodel:omnivise t3000 domain controllerscope: - version: -

Trust: 0.6

vendor:siemensmodel:omnivise t3000 product data managementscope: - version: -

Trust: 0.6

vendor:siemensmodel:omnivise t3000 terminal serverscope: - version: -

Trust: 0.6

vendor:siemensmodel:omnivise t3000 thin clientscope: - version: -

Trust: 0.6

vendor:siemensmodel:omnivise t3000 whitelisting serverscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-35108 // JVNDB: JVNDB-2024-008314 // NVD: CVE-2024-38878

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-38878
value: MEDIUM

Trust: 1.0

productcert@siemens.com: CVE-2024-38878
value: MEDIUM

Trust: 1.0

NVD: CVE-2024-38878
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2024-35108
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-35108
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-38878
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

productcert@siemens.com: CVE-2024-38878
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-38878
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-35108 // JVNDB: JVNDB-2024-008314 // NVD: CVE-2024-38878 // NVD: CVE-2024-38878

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-008314 // NVD: CVE-2024-38878

PATCH

title:Patch for Siemens Omnivise T3000 Application Server Path Traversal Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/576721

Trust: 0.6

sources: CNVD: CNVD-2024-35108

EXTERNAL IDS

db:NVDid:CVE-2024-38878

Trust: 3.2

db:SIEMENSid:SSA-857368

Trust: 2.4

db:JVNid:JVNVU99298639

Trust: 0.8

db:JVNDBid:JVNDB-2024-008314

Trust: 0.8

db:CNVDid:CNVD-2024-35108

Trust: 0.6

sources: CNVD: CNVD-2024-35108 // JVNDB: JVNDB-2024-008314 // NVD: CVE-2024-38878

REFERENCES

url:https://cert-portal.siemens.com/productcert/html/ssa-857368.html

Trust: 2.4

url:https://jvn.jp/vu/jvnvu99298639/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-38878

Trust: 0.8

sources: CNVD: CNVD-2024-35108 // JVNDB: JVNDB-2024-008314 // NVD: CVE-2024-38878

SOURCES

db:CNVDid:CNVD-2024-35108
db:JVNDBid:JVNDB-2024-008314
db:NVDid:CVE-2024-38878

LAST UPDATE DATE

2024-09-19T22:14:25.482000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-35108date:2024-08-12T00:00:00
db:JVNDBid:JVNDB-2024-008314date:2024-09-18T07:03:00
db:NVDid:CVE-2024-38878date:2024-09-17T15:50:41.117

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-35108date:2024-08-12T00:00:00
db:JVNDBid:JVNDB-2024-008314date:2024-09-18T00:00:00
db:NVDid:CVE-2024-38878date:2024-08-02T11:16:42.260