{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T16:22:21.616","vulnerabilities":[{"cve":{"id":"CVE-2018-5473","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2018-02-19T18:29:00.257","lastModified":"2024-11-21T04:08:52.313","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. The SSH functions of the device are vulnerable to buffer overflow conditions that may allow a remote attacker to execute arbitrary code on the device."},{"lang":"es","value":"Se ha descubierto un problema de restricción indebida de operaciones en los límites de un búfer de memoria en los dispositivos GE D60 Line Distance Relay que ejecutan la versión de firmware 7.11 y anteriores. Las funciones SSH del dispositivo son vulnerables a condiciones de desbordamiento de búfer que podrían permitir que un atacante remoto ejecute código arbitrario en el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"7.11","matchCriteriaId":"E794B690-7678-4D07-A413-B07757B32B54"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*","matchCriteriaId":"8CA23112-E10C-40E4-A8CD-F90D0BFF6636"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103054","source":"ics-cert@hq.dhs.gov","tags":["Broken Link"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/103054","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}