{"api_version":"1","generated_at":"2026-04-23T11:33:08+00:00","cve":"CVE-2019-8280","urls":{"html":"https://cve.report/CVE-2019-8280","api":"https://cve.report/api/cve/CVE-2019-8280.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-8280","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-8280"},"summary":{"title":"CVE-2019-8280","description":"UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code execution. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.","state":"PUBLIC","assigner":"vulnerability@kaspersky.com","published_at":"2019-03-08 23:29:00","updated_at":"2021-06-28 13:15:00"},"problem_types":["CWE-125","CWE-787"],"metrics":[],"references":[{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/","name":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/","refsource":"MISC","tags":["Third Party Advisory"],"title":"KLCERT-19-009: UltraVNC Access of Memory Location After End of Buffer | Kaspersky ICS CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"0"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","refsource":"MISC","tags":[],"title":"Siemens SIMATIC UltraVNC HMI WinCC Products | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","name":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","refsource":"MISC","tags":[],"title":"Siemens SINUMERIK | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-8280","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8280","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"8280","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"uvnc","cpe5":"ultravnc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"8280","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"uvnc","cpe5":"ultravnc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-8280","qid":"590701","title":"Siemens SINAMICS Medium Voltage Products Remote Access (Update B) Multiple Vulnerabilities (ICSA-21-131-04) (ssa-286838)"},{"cve":"CVE-2019-8280","qid":"590854","title":"Schneider Electric TelevisGo Multiple Vulnerabilities (SEVD-2019-225-05)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vulnerability@kaspersky.com","DATE_PUBLIC":"2019-03-01T00:00:00","ID":"CVE-2019-8280","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"UltraVNC","version":{"version_data":[{"version_value":"1.2.2.3"}]}}]},"vendor_name":"Kaspersky Lab"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code execution. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-788: Access of Memory Location After End of Buffer"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/","refsource":"MISC","url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf"},{"refsource":"MISC","name":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06","url":"https://www.us-cert.gov/ics/advisories/icsa-20-161-06"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf"},{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11"}]}},"nvd":{"publishedDate":"2019-03-08 23:29:00","lastModifiedDate":"2021-06-28 13:15:00","problem_types":["CWE-125","CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.2.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"8280","Ordinal":"146113","Title":"CVE-2019-8280","CVE":"CVE-2019-8280","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"8280","Ordinal":"1","NoteData":"UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code execution. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"8280","Ordinal":"2","NoteData":"2019-03-08","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"8280","Ordinal":"3","NoteData":"2021-06-28","Type":"Other","Title":"Modified"}]}}}