CVE-2018-4851

A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could cause a Denial-of-Service condition by sending certain packets to the device, causing potential reboots of the device. The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed.
References
Link Resource
http://www.securityfocus.com/bid/104672 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-03 14:29

Updated : 2024-02-04 19:46


NVD link : CVE-2018-4851

Mitre link : CVE-2018-4851

CVE.ORG link : CVE-2018-4851


JSON object : View

Products Affected

siemens

  • siclock_tc400
  • siclock_tc100_firmware
  • siclock_tc100
  • siclock_tc400_firmware
CWE
CWE-20

Improper Input Validation

CWE-399

Resource Management Errors