CVE-2012-1799
Summary
| CVE | CVE-2012-1799 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-04-18 10:33:00 UTC |
| Updated | 2012-12-06 04:18:00 UTC |
| Description | The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Siemens | Scalance S602 | v2 | All | All | All |
| Hardware | Siemens | Scalance S602 | v2 | All | All | All |
| Hardware | Siemens | Scalance S612 | v2 | All | All | All |
| Hardware | Siemens | Scalance S612 | v2 | All | All | All |
| Hardware | Siemens | Scalance S613 | v2 | All | All | All |
| Hardware | Siemens | Scalance S613 | v2 | All | All | All |
| Application | Siemens | Scalance S Firmware | 2.1.0 | All | All | All |
| Application | Siemens | Scalance S Firmware | 2.2.0 | All | All | All |
| Application | Siemens | Scalance S Firmware | 2.1.0 | All | All | All |
| Application | Siemens | Scalance S Firmware | 2.2.0 | All | All | All |
| Application | Siemens | Scalance S Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 404 - File Not Found | CISA | MISC | www.us-cert.gov | US Government Resource |
| 81033 | OSVDB | osvdb.org | |
| Siemens Industry Online Support - Automation Service, Automation Support, Simatic Service, Simatic Support, Technical Support, Technical Consulting | CONFIRM | support.automation.siemens.com | |
| Siemens | CONFIRM | www.siemens.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.