CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.4%
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to obtain sensitive device information over the network.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | sm-2556_firmware | dnpi00 | cpe:2.3:o:siemens:sm-2556_firmware:dnpi00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | enos00 | cpe:2.3:o:siemens:sm-2556_firmware:enos00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | erac00 | cpe:2.3:o:siemens:sm-2556_firmware:erac00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | eta2 | cpe:2.3:o:siemens:sm-2556_firmware:eta2:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | etls00 | cpe:2.3:o:siemens:sm-2556_firmware:etls00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | modi00 | cpe:2.3:o:siemens:sm-2556_firmware:modi00:*:*:*:*:*:*:* |
siemens | sm-2556 | - | cpe:2.3:h:siemens:sm-2556:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.4%