{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T14:56:23.137","vulnerabilities":[{"cve":{"id":"CVE-2018-13806","sourceIdentifier":"productcert@siemens.com","published":"2018-09-12T13:29:01.047","lastModified":"2024-11-21T03:48:06.123","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIEMENS TD Keypad Designer (All versions). A DLL hijacking vulnerability exists in all versions of SIEMENS TD Keypad Designer which could allow an attacker to execute code with the permission of the user running TD Designer. The attacker must have write access to the directory containing the TD project file in order to exploit the vulnerability. A legitimate user with higher privileges than the attacker must open the TD project in order for this vulnerability to be exploited. At the time of advisory publication no public exploitation of this security vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en SIEMENS TD Keypad Designer (todas las versiones). Existe una vulnerabilidad de secuestro de DLL en todas las versiones de SIEMENS TD Keypad Designer, lo que podría permitir que un atacante ejecute código con los permisos del usuario que ejecuta TD Designer. El atacante debe tener acceso de escritura al directorio que contiene el archivo de proyecto TD para explotar esta vulnerabilidad. Un usuario legítimo con privilegios más altos que los del atacante debe abrir el proyecto TD para que esta vulnerabilidad pueda ser explotada. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:td_keypad_designer:*:*:*:*:*:*:*:*","matchCriteriaId":"9909DF15-DE39-44E9-B74D-37AF2CAFF3C3"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-198330.pdf","source":"productcert@siemens.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-198330.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}