Vulnerability Details : CVE-2019-10928
A vulnerability has been identified in SCALANCE SC-600 (V2.0). An authenticated attacker with access to port 22/tcp as well as physical access to an affected device may trigger the device to allow execution of arbitrary commands. The security vulnerability could be exploited by an authenticated attacker with physical access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the confidentiality, integrity and availability of the affected device.
Exploit prediction scoring system (EPSS) score for CVE-2019-10928
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 10 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-10928
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
6.6
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
0.7
|
5.9
|
NIST |
CWE ids for CVE-2019-10928
-
The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product.Assigned by: productcert@siemens.com (Secondary)
References for CVE-2019-10928
-
https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf
Vendor Advisory
Products affected by CVE-2019-10928
- cpe:2.3:o:siemens:scalance_sc-600_firmware:2.0:*:*:*:*:*:*:*