{"api_version":"1","generated_at":"2026-04-23T09:37:39+00:00","cve":"CVE-2019-8277","urls":{"html":"https://cve.report/CVE-2019-8277","api":"https://cve.report/api/cve/CVE-2019-8277.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-8277","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-8277"},"summary":{"title":"CVE-2019-8277","description":"UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.","state":"PUBLIC","assigner":"vulnerability@kaspersky.com","published_at":"2019-03-08 23:29:00","updated_at":"2021-06-28 13:15:00"},"problem_types":["CWE-665"],"metrics":[],"references":[{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/","name":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"KLCERT-19-024: UltraVNC Improper Initialization | Kaspersky Lab ICS CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"0"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","refsource":"MISC","tags":[],"title":"Siemens SIMATIC UltraVNC HMI WinCC Products | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","name":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Siemens SINUMERIK | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-8277","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8277","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_access_mymachine/p2p","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_access_mymachine\\/p2p","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_access_mymachine\\/p2p","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_pcu_base_win10_software/ipc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_pcu_base_win10_software\\/ipc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_pcu_base_win10_software\\/ipc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"12.01","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_pcu_base_win7_software/ipc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"12.01","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinumerik_pcu_base_win7_software\\/ipc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"uvnc","cpe5":"ultravnc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8277","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"uvnc","cpe5":"ultravnc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-8277","qid":"590701","title":"Siemens SINAMICS Medium Voltage Products Remote Access (Update B) Multiple Vulnerabilities (ICSA-21-131-04) (ssa-286838)"},{"cve":"CVE-2019-8277","qid":"590854","title":"Schneider Electric TelevisGo Multiple Vulnerabilities (SEVD-2019-225-05)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-8277","ASSIGNER":"vulnerability@kaspersky.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Kaspersky Lab","product":{"product_data":[{"product_name":"UltraVNC","version":{"version_data":[{"version_value":"revision 1211"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"multiple memory leaks (CWE-665)"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/","url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf"},{"refsource":"MISC","name":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf"},{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11"}]},"description":{"description_data":[{"lang":"eng","value":"UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212."}]}},"nvd":{"publishedDate":"2019-03-08 23:29:00","lastModifiedDate":"2021-06-28 13:15:00","problem_types":["CWE-665"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.2.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*","versionEndIncluding":"12.01","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*","versionEndExcluding":"14.00","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"8277","Ordinal":"146110","Title":"CVE-2019-8277","CVE":"CVE-2019-8277","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"8277","Ordinal":"1","NoteData":"UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"8277","Ordinal":"2","NoteData":"2019-03-08","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"8277","Ordinal":"3","NoteData":"2021-06-28","Type":"Other","Title":"Modified"}]}}}