{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T14:18:52.126","vulnerabilities":[{"cve":{"id":"CVE-2019-10937","sourceIdentifier":"productcert@siemens.com","published":"2019-09-13T17:15:11.427","lastModified":"2024-11-21T04:20:11.550","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIMATIC TDC CP51M1 (All versions < V1.1.7). An attacker with network access to the device could cause a Denial-of-Service condition by sending a specially crafted UDP packet. The vulnerability affects the UDP communication of the device. The security vulnerability could be exploited without authentication. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en SIMATIC TDC CP51M1 (Todas las versiones anteriores a V1.1.7). Un atacante con acceso de red al dispositivo podría causar una condición de Denegación de Servicio mediante el envío de un paquete UDP especialmente diseñado. La vulnerabilidad afecta la comunicación UDP del dispositivo. La vulnerabilidad de seguridad podría ser explotada sin autenticación. No es requerida la interacción del usuario para explotar esta vulnerabilidad de seguridad. Una explotación con éxito de la vulnerabilidad de seguridad compromete la disponibilidad del sistema apuntado. Al momento de la publicación de asesoramiento, no se conocía una explotación pública de esta vulnerabilidad de seguridad."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_tdc_cp51m1_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.7","matchCriteriaId":"B79687DC-EC89-40BD-ADD6-93BDF26E4877"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_tdc_cp51m1:-:*:*:*:*:*:*:*","matchCriteriaId":"8DA1E7C4-6352-41A4-8A94-C24DDB456572"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-253-05","source":"productcert@siemens.com"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-253-05","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}