CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
84.7%
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | sm-2556_firmware | dnpi00 | cpe:2.3:o:siemens:sm-2556_firmware:dnpi00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | enos00 | cpe:2.3:o:siemens:sm-2556_firmware:enos00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | erac00 | cpe:2.3:o:siemens:sm-2556_firmware:erac00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | eta2 | cpe:2.3:o:siemens:sm-2556_firmware:eta2:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | etls00 | cpe:2.3:o:siemens:sm-2556_firmware:etls00:*:*:*:*:*:*:* |
siemens | sm-2556_firmware | modi00 | cpe:2.3:o:siemens:sm-2556_firmware:modi00:*:*:*:*:*:*:* |
siemens | sm-2556 | - | cpe:2.3:h:siemens:sm-2556:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
84.7%