Commits 06/27/2018

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Entry

Field

source_cve_assigned147
source_cve_nvd_published146
vulnerability_cwe146
vulnerability_cvss3_vuldb_rc141
vulnerability_cvss3_vuldb_rl141

Commit Conf

100%7205
90%1285
98%133

Approve Conf

100%7205
90%1285
98%133

IDUserEntryFieldChangeRemarksAcceptedReasonC
8025855VulD...120010cvss3_nvd_basescore9.8nist.gov06/27/2018accepted
90
8025854VulD...120010cvss3_vuldb_rcXsee CVSS documentation06/27/2018accepted
90
8025853VulD...120010cvss3_vuldb_rlWsee CVSS documentation06/27/2018accepted
90
8025852VulD...120010cvss3_vuldb_eXsee CVSS documentation06/27/2018accepted
90
8025851VulD...120010cvss2_vuldb_rcNDsee CVSS documentation06/27/2018accepted
90
8025850VulD...120010cvss2_vuldb_rlWsee CVSS documentation06/27/2018accepted
90
8025849VulD...120010cvss2_vuldb_eNDsee CVSS documentation06/27/2018accepted
90
8025848VulD...120010locationWebsite06/27/2018accepted
90
8025847VulD...120010seealso12000906/27/2018accepted
100
8025846VulD...120010cve_nvd_summaryA vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.cve.org06/27/2018accepted
100
8025845VulD...120010cve_nvd_published1529964000cve.org06/27/2018accepted
100
8025844VulD...120010cve_assigned1514851200cve.org06/27/2018accepted
100
8025843VulD...120010cveCVE-2018-4846cve.org06/27/2018accepted
100
8025842VulD...120010nameFirewall06/27/2018accepted
100
8025841VulD...120010price_0day$5k-$25ksee exploit price documentation06/27/2018accepted
100
8025839VulD...120010urlhttps://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdfcert-portal.siemens.com06/27/2018accepted
100
8025838VulD...120010date1529971200 (06/26/2018)06/27/2018accepted
100
8025837VulD...120010cvss3_nvd_aHnist.gov06/27/2018accepted
100
8025836VulD...120010cvss3_nvd_iHnist.gov06/27/2018accepted
100
8025835VulD...120010cvss3_nvd_cHnist.gov06/27/2018accepted
100

8603 more entries are not shown

Do you know our Splunk app?

Download it now for free!