A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
Published 2018-03-29 13:29:00
Updated 2023-03-24 17:36:34
Source Siemens AG
View at NVD,   CVE.org
Vulnerability category: BypassGain privilegeDenial of service

Products affected by CVE-2018-4841

Exploit prediction scoring system (EPSS) score for CVE-2018-4841

0.38%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2018-4841

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2018-4841

References for CVE-2018-4841

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!