Show plain JSON{"id": "CVE-2024-54092", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "productcert@siemens.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}], "cvssMetricV40": [{"type": "Secondary", "source": "productcert@siemens.com", "cvssData": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 9.3, "Automatable": "NOT_DEFINED", "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED"}}]}, "published": "2025-04-08T09:15:23.320", "references": [{"url": "https://cert-portal.siemens.com/productcert/html/ssa-634640.html", "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/html/ssa-819629.html", "source": "productcert@siemens.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Primary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-1390"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All versions), Industrial Edge Device Kit - arm64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - arm64 V1.21 (All versions < V1.21.1-1), Industrial Edge Device Kit - x86-64 V1.17 (All versions), Industrial Edge Device Kit - x86-64 V1.18 (All versions), Industrial Edge Device Kit - x86-64 V1.19 (All versions), Industrial Edge Device Kit - x86-64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - x86-64 V1.21 (All versions < V1.21.1-1), Industrial Edge Own Device (IEOD) (All versions < V1.21.1-1-a), Industrial Edge Virtual Device (All versions < V1.21.1-1-a), SCALANCE LPE9413 (6GK5998-3GS01-2AC2) (All versions), SIMATIC IPC BX-39A Industrial Edge Device (All versions < V3.0), SIMATIC IPC BX-59A Industrial Edge Device (All versions < V3.0), SIMATIC IPC127E Industrial Edge Device (All versions < V3.0), SIMATIC IPC227E Industrial Edge Device (All versions < V3.0), SIMATIC IPC427E Industrial Edge Device (All versions < V3.0), SIMATIC IPC847E Industrial Edge Device (All versions < V3.0). Affected devices do not properly enforce user authentication on specific API endpoints when identity federation is used. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that identity federation is currently or has previously been used and the attacker has learned the identity of a legitimate user."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en Industrial Edge Device Kit - arm64 V1.17 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.18 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.19 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.20 (Todas las versiones < V1.20.2-1), Industrial Edge Device Kit - arm64 V1.21 (Todas las versiones < V1.21.1-1), Industrial Edge Device Kit - x86-64 V1.17 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.18 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.19 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.20 (Todas las versiones < V1.20.2-1), Industrial Edge Device Kit - x86-64 V1.21 (Todas las versiones < V1.21.1-1), Industrial Edge Own Device (IEOD) (Todas las versiones < V1.21.1-1-a), Industrial Edge Device Kit (todas las versiones < V1.21.1-1-a), SCALANCE LPE9413 (6GK5998-3GS01-2AC2) (todas las versiones), SIMATIC IPC BX-39A Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC BX-59A Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC127E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC227E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC427E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC847E Industrial Edge Device (todas las versiones < V3.0). Los dispositivos afectados no aplican correctamente la autenticaci\u00f3n de usuario en endpoints de API espec\u00edficos cuando se utiliza la federaci\u00f3n de identidades. Esto podr\u00eda facilitar que un atacante remoto no autenticado eluda la autenticaci\u00f3n y se haga pasar por un usuario leg\u00edtimo. Para una explotaci\u00f3n exitosa es necesario que la federaci\u00f3n de identidad est\u00e9 actualmente en uso o se haya utilizado anteriormente y que el atacante haya conocido la identidad de un usuario leg\u00edtimo."}], "lastModified": "2025-04-08T18:13:53.347", "sourceIdentifier": "productcert@siemens.com"}