{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T10:37:16.181","vulnerabilities":[{"cve":{"id":"CVE-2019-13943","sourceIdentifier":"productcert@siemens.com","published":"2019-12-12T19:15:15.077","lastModified":"2024-11-21T04:25:44.693","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en la variante DNP3 del módulo EN100 Ethernet (todas las versiones), la variante IEC 61850 del módulo EN100 Ethernet (todas las versiones anteriores a V4.37), la variante IEC104 del módulo EN100 Ethernet (todas las versiones), la variante Modbus TCP del módulo EN100 Ethernet (todas las versiones), la variante PROFINET IO del módulo EN100 Ethernet (todas las versiones). La interfaz web podría permitir ataques de tipo Cross-Site Scripting (XSS) si un atacante puede modificar el contenido de páginas web particulares, causando que la aplicación se comporte de manera inesperada para usuarios legítimos. Una explotación con éxito no requiere que un atacante se autentique en la interfaz web. Esto podría permitir al atacante leer o modificar el contenido de la aplicación web. Al momento de la publicación del aviso no hay explotación pública de esta seguridad. La vulnerabilidad era conocida."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:en100_ethernet_module_with_firmware_variant_dnp3_tcp:*:*:*:*:*:*:*:*","matchCriteriaId":"AF72E8A5-4A16-4CF8-9E61-AFFC03601E6E"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:en100_ethernet_module_with_firmware_variant_iec_61850:*:*:*:*:*:*:*:*","versionEndExcluding":"4.37","matchCriteriaId":"5B8072EE-0802-4BDF-AFD7-40903FD1E745"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:en100_ethernet_module_with_firmware_variant_iec104:*:*:*:*:*:*:*:*","matchCriteriaId":"F4A4DECE-7ECB-4E8B-8617-75FDFE98FCA4"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:en100_ethernet_module_with_firmware_variant_modbus_tcp:*:*:*:*:*:*:*:*","matchCriteriaId":"1E6BB145-4C7D-4E30-8058-A809DBB65735"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:en100_ethernet_module_with_firmware_variant_profinet_io:*:*:*:*:*:*:*:*","matchCriteriaId":"49004945-B9EA-4AFE-8B95-CC7C8F80FAD6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:en100_ethernet_module:-:*:*:*:*:*:*:*","matchCriteriaId":"DAC429FD-7148-4A68-AA81-8FBADA588F4E"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-344-07","source":"productcert@siemens.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-344-07","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}