A vulnerability in SPPA-T3000 MS3000 Migration Server (All versions) allows for a Denial-of-Service attack by sending crafted packets to port 5010/tc
Reporter | Title | Published | Views | Family All 56 |
---|---|---|---|---|
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
Prion | Design/Logic Flaw | 12 Dec 201919:15 | – | prion |
[
{
"product": "SPPA-T3000 MS3000 Migration Server",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
}
]
Source | Link |
---|---|
cert-portal | www.cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf |
packetstormsecurity | www.packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo