A vulnerability has been identified in SICAM A8000 CP-8000 (All versions < V14), SICAM A8000 CP-802X (All versions < V14), SICAM A8000 CP-8050 (All versions < V2.00). Specially crafted network packets sent to port 80/TCP or 443/TCP could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the web server. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/TCP or 443/TCP. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the web server. A system reboot is required to recover the web service of the device. At the time of advisory update, exploit code for this security vulnerability is public.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-579309.pdf | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2019-03-21T18:48:48
Updated: 2019-03-21T18:48:48
Reserved: 2018-07-10T00:00:00
Link: CVE-2018-13798
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-21T19:29:00.347
Modified: 2019-04-02T16:34:01.270
Link: CVE-2018-13798
JSON object: View
Redhat Information
No data.
CWE