Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-4851


A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.


Published

2018-07-03T14:29:00.227

Last Modified

2024-11-21T04:07:35.133

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 8.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

7.8

Weaknesses
  • Type: Secondary
    CWE-399
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System siemens siclock_tc400_firmware - Yes
Hardware siemens siclock_tc400 - No
Operating System siemens siclock_tc100_firmware - Yes
Hardware siemens siclock_tc100 - No

References