{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T10:11:03.509","vulnerabilities":[{"cve":{"id":"CVE-2019-10939","sourceIdentifier":"productcert@siemens.com","published":"2020-04-14T20:15:14.293","lastModified":"2024-11-21T04:20:11.797","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en TIM 3V-IE (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V2.8), TIM 3V-IE Advanced (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V2.8), TIM 3V- IE DNP3 (incluyendo las variantes SIPLUS NET) (todas las versiones anteriores a V3.3), TIM 4R-IE (incluyendo las variantes SIPLUS NET) (todas las versiones anteriores a V2.8), TIM 4R-IE DNP3 (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V3.3). Las versiones afectadas contienen un puerto de depuración abierto que está disponible bajo determinadas condiciones específicas. La vulnerabilidad está solo disponible si la dirección IP está configurada en 192.168.1.2. Si está disponible, el puerto de depuración podría ser explotado por un atacante con acceso de red al dispositivo. No es requerida una interacción del usuario para explotar esta vulnerabilidad. La vulnerabilidad afecta la confidencialidad, integridad y disponibilidad del dispositivo afectado. En la etapa de publicación de este aviso de seguridad ninguna explotación pública era conocida."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-489"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_3v-ie_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8","matchCriteriaId":"DE941163-1A8B-4BE4-8259-CCFF8890C76C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_3v-ie:-:*:*:*:*:*:*:*","matchCriteriaId":"0A3D550B-FF8C-4A33-B630-0297DE89E4A7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_3v-ie_advanced_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8","matchCriteriaId":"4BF5BC34-A625-4AAB-BFA1-BD7F99A0D54D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_3v-ie_advanced:-:*:*:*:*:*:*:*","matchCriteriaId":"BC0F3C5A-B220-48E1-915E-CD77EC0C3CAB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_4r-ie_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3","matchCriteriaId":"D6DF78B0-EACC-433A-86AD-62D68AA0E05E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_4r-ie:-:*:*:*:*:*:*:*","matchCriteriaId":"0B87B16C-9E9F-448B-9255-B2BB2B8CAD63"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_3v-ie_dnp3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8","matchCriteriaId":"1A0628FE-F792-4D3A-A299-42AD54237AEB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_3v-ie_dnp3:-:*:*:*:*:*:*:*","matchCriteriaId":"E224F1B2-72F8-47AF-AFA1-DDF70789B326"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3","matchCriteriaId":"CF8D6173-4B71-4B52-A0C4-91F95CCCA0E1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*","matchCriteriaId":"EE27728D-D37B-43FC-BA8A-0E930DDBD10B"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}