{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T08:39:25.565","vulnerabilities":[{"cve":{"id":"CVE-2018-4841","sourceIdentifier":"productcert@siemens.com","published":"2018-03-29T13:29:00.210","lastModified":"2024-11-21T04:07:33.813","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en TIM 1531 IRC (todas las versiones anteriores a V1.1). Un atacante remoto con acceso de red al puerto 80/tcp o al puerto 443/tcp podría realizar operaciones administrativas en el dispositivo sin autenticación anterior. La explotación exitosa de esta vulnerabilidad podría permitir una denegación de servicio (DoS) o la lectura y manipulación de datos como las opciones de configuración del dispositivo afectado. En el momento de publicación de este advisory de seguridad, no se conoce ninguna explotación pública. Siemens proporciona mitigaciones para resolver este problema de seguridad."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-303"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1","matchCriteriaId":"9AE61932-8868-48B9-A2F7-286BA6F0DA6B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*","matchCriteriaId":"C1D94BEB-BBFB-4258-9835-87DBBB999239"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103576","source":"productcert@siemens.com","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/103576","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}