{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T17:49:41.729","vulnerabilities":[{"cve":{"id":"CVE-2018-13801","sourceIdentifier":"productcert@siemens.com","published":"2018-10-10T17:29:03.827","lastModified":"2024-11-21T03:48:04.607","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in ROX II (All versions < V2.12.1). An attacker with network access to port 22/tcp and valid low-privileged user credentials for the target device could perform a privilege escalation and gain root privileges. Successful exploitation requires user privileges of a low-privileged user but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en ROX II (todas las versiones anteriores a V2.12.1). Un atacante con acceso de red al puerto 22/tcp y credenciales de usuario válidas con pocos privilegios para el dispositivo objetivo podría realizar un escalado de privilegios y obtener privilegios root. La explotación exitosa requiere privilegios de usuario con pocos privilegios, pero no requiere que el usuario interactúe. Esta vulnerabilidad podría permitir que un atacante comprometa la confidencialidad, integridad y disponibilidad del sistema."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:rox_ii_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.12.1","matchCriteriaId":"60522046-6A22-4087-96D2-A9F825D85CE0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:rox_ii:-:*:*:*:*:*:*:*","matchCriteriaId":"DA1FB2BC-5AE4-489F-A292-F7820CCB6838"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105545","source":"productcert@siemens.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-282-03","source":"productcert@siemens.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/105545","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-282-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}