SB2018012519 - Multiple vulnerabilities in Siemens TeleControl Server Basic



SB2018012519 - Multiple vulnerabilities in Siemens TeleControl Server Basic

Published: January 25, 2018 Updated: January 25, 2018

Security Bulletin ID SB2018012519
Severity
Low
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2018-4835)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to authentication bypass. A remote attacker with network access to Port 8000/TCP can bypass authentication and gain access to limited information.

2) Privilege escalation (CVE-ID: CVE-2018-4836)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper access and privileges controls. A remote attacker with network access to Port 8000/TCP can escalate his privileges and perform administrative operations.

3) Resource exhaustion (CVE-ID: CVE-2018-4837)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to resource exhaustion. A remote attacker with access to the TeleControl Server Basic’s webserver (Ports 80/TCP or 443/TCP) can trigger memory corruption and cause the web server to crash.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.