Vulnerability Change Records for CVE-2019-10930

Change History

Initial Analysis 7/19/2019 9:21:14 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:siemens:digsi_5_engineering_software:7.90:*:*:*:*:*:*:*
          *cpe:2.3:a:siemens:siprotec_5_digsi_device_driver:7.90:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*
          cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Added CWE

								
							
							
						
CWE-434
Changed Reference Type
https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf No Types Assigned
https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf Vendor Advisory

CVE Modified by MITRE 10/09/2019 7:45:02 PM

Action Type Old Value New Value
Added CWE

								
							
							
						
Siemens AG CWE-552

CVE Modified by MITRE 6/10/2020 1:15:10 PM

Action Type Old Value New Value
Changed Description
A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.
A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system.