Lucene search

K
cve[email protected]CVE-2012-4356
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-4356

2022-10-0316:15:32
CWE-22
web.nvd.nist.gov
27
cve-2012-4356
sielco sistemi
winlog pro scada
directory traversal
vulnerability
remote attackers
arbitrary files
nvd

7 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.8%

Multiple directory traversal vulnerabilities in Sielco Sistemi Winlog Pro SCADA before 2.07.17 and Winlog Lite SCADA before 2.07.17 allow remote attackers to read arbitrary files via port-46824 TCP packets specifying a file-open operation with opcode 0x78 and a … (dot dot) in a pathname, followed by a file-read operation with opcode (1) 0x96, (2) 0x97, or (3) 0x98.

Affected configurations

NVD
Node
sielcosistemiwinlog_proRange2.07.16
OR
sielcosistemiwinlog_proMatch2.06.00
OR
sielcosistemiwinlog_proMatch2.06.03
OR
sielcosistemiwinlog_proMatch2.06.04
OR
sielcosistemiwinlog_proMatch2.06.06
OR
sielcosistemiwinlog_proMatch2.06.09
OR
sielcosistemiwinlog_proMatch2.06.10
OR
sielcosistemiwinlog_proMatch2.06.12
OR
sielcosistemiwinlog_proMatch2.06.13
OR
sielcosistemiwinlog_proMatch2.06.14
OR
sielcosistemiwinlog_proMatch2.06.18
OR
sielcosistemiwinlog_proMatch2.06.21
OR
sielcosistemiwinlog_proMatch2.06.24
OR
sielcosistemiwinlog_proMatch2.06.25
OR
sielcosistemiwinlog_proMatch2.06.28
OR
sielcosistemiwinlog_proMatch2.06.40
OR
sielcosistemiwinlog_proMatch2.06.46
OR
sielcosistemiwinlog_proMatch2.06.50
OR
sielcosistemiwinlog_proMatch2.06.60
OR
sielcosistemiwinlog_proMatch2.06.73
OR
sielcosistemiwinlog_proMatch2.06.86
OR
sielcosistemiwinlog_proMatch2.07.00
OR
sielcosistemiwinlog_proMatch2.07.01
OR
sielcosistemiwinlog_proMatch2.07.08
OR
sielcosistemiwinlog_proMatch2.07.09
OR
sielcosistemiwinlog_proMatch2.07.11
OR
sielcosistemiwinlog_proMatch2.07.14
Node
sielcosistemiwinlog_liteRange2.07.16
OR
sielcosistemiwinlog_liteMatch2.06.00
OR
sielcosistemiwinlog_liteMatch2.06.03
OR
sielcosistemiwinlog_liteMatch2.06.04
OR
sielcosistemiwinlog_liteMatch2.06.06
OR
sielcosistemiwinlog_liteMatch2.06.09
OR
sielcosistemiwinlog_liteMatch2.06.10
OR
sielcosistemiwinlog_liteMatch2.06.12
OR
sielcosistemiwinlog_liteMatch2.06.13
OR
sielcosistemiwinlog_liteMatch2.06.14
OR
sielcosistemiwinlog_liteMatch2.06.18
OR
sielcosistemiwinlog_liteMatch2.06.21
OR
sielcosistemiwinlog_liteMatch2.06.24
OR
sielcosistemiwinlog_liteMatch2.06.25
OR
sielcosistemiwinlog_liteMatch2.06.28
OR
sielcosistemiwinlog_liteMatch2.06.40
OR
sielcosistemiwinlog_liteMatch2.06.46
OR
sielcosistemiwinlog_liteMatch2.06.50
OR
sielcosistemiwinlog_liteMatch2.06.60
OR
sielcosistemiwinlog_liteMatch2.06.73
OR
sielcosistemiwinlog_liteMatch2.06.86
OR
sielcosistemiwinlog_liteMatch2.07.00
OR
sielcosistemiwinlog_liteMatch2.07.01
OR
sielcosistemiwinlog_liteMatch2.07.08
OR
sielcosistemiwinlog_liteMatch2.07.09
OR
sielcosistemiwinlog_liteMatch2.07.11
OR
sielcosistemiwinlog_liteMatch2.07.14

7 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.8%

Related for CVE-2012-4356