| Title | RAPIDLab および RAPIDPoint におけるハードコードされた認証情報の使用に関する脆弱性 |
|---|---|
| Summary | RAPIDLab および RAPIDPoint には、ハードコードされた認証情報の使用に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 12, 2018, midnight |
| Registration Date | Sept. 20, 2018, 3:55 p.m. |
| Last Update | Sept. 20, 2018, 3:55 p.m. |
| CVSS3.0 : 緊急 | |
| Score | 9.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVSS2.0 : 危険 | |
| Score | 10 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| シーメンス |
| RAPIDLab 1200 ファームウェア |
| RAPIDPoint 400 ファームウェア |
| RAPIDPoint 500 ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年09月20日] 掲載 |
Sept. 20, 2018, 3:55 p.m. |
| Summary | A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue. |
|---|---|
| Publication Date | June 27, 2018, 3:29 a.m. |
| Registration Date | March 1, 2021, 7:28 p.m. |
| Last Update | Nov. 21, 2024, 1:07 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:rapidpoint_400_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:rapidpoint_400:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:* | 2.3 | ||||
| cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:* | 3.0 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:rapidlab_1200_firmware:*:*:*:*:*:*:*:* | 3.3 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:rapidlab_1200:-:*:*:*:*:*:*:* | ||||