{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T16:41:30.515","vulnerabilities":[{"cve":{"id":"CVE-2018-13810","sourceIdentifier":"productcert@siemens.com","published":"2019-04-17T14:29:03.230","lastModified":"2024-11-21T03:48:06.863","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en CP 1604 (todas las versiones), CP 1616 (todas las versiones). La configuración integrada del servidor web de los dispositivos CP afectados podría permitir un Cross-Site Request Forgery (CSRF) si un usuario confiado es engañado para acceder a un enlace malicioso. La explotación con éxito requiere la interacción del usuario por parte de un usuario legítimo. Un ataque con éxito podría permitir a un atacante desencadenar acciones por medio de la interfaz web que el usuario legítimo puede realizar. En el momento de la publicación consultiva, no se conocía la explotación pública de esta vulnerabilidad."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:cp_1604_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.8","matchCriteriaId":"6DC92E3A-CA37-4D08-A0EB-71DBB4C5395A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cp_1604:-:*:*:*:*:*:*:*","matchCriteriaId":"6148BD0D-5BD1-4182-8202-EBDB56B0D146"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:cp_1616_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.8","matchCriteriaId":"4D5FEC73-E96E-4945-8C0B-4A7B5B236ABD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cp_1616:-:*:*:*:*:*:*:*","matchCriteriaId":"1D7CC79A-1446-415F-8BFF-71C82C9256BB"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}