{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T00:40:28.372","vulnerabilities":[{"cve":{"id":"CVE-2020-7593","sourceIdentifier":"productcert@siemens.com","published":"2020-07-14T14:15:19.150","lastModified":"2024-11-21T05:37:26.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (V1.81.01 - V1.81.03), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.01), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.02). A buffer overflow vulnerability exists in the Web Server functionality of the device. A remote unauthenticated attacker could send a specially crafted HTTP request to cause a memory corruption, potentially resulting in remote code execution."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en LOGO! 8 BM (incluyendo las variantes SIPLUS) (versiones V1.81.01 - V1.81.03), LOGO! 8 BM (incluyendo las variantes SIPLUS) (versión V1.82.01), LOGO! 8 BM (incluyendo las variantes SIPLUS) (versión V1.82.02). Se presenta una vulnerabilidad de desbordamiento del búfer en la funcionalidad Web Server del dispositivo. Un atacante remoto no autenticado podría enviar una petición HTTP especialmente diseñada para causar daños en la memoria, resultando potencialmente en una ejecución de código remota"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:logo\\!_8_bm_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.81.01","versionEndIncluding":"1.81.03","matchCriteriaId":"1008F18E-ADAE-4E5E-96E1-1516560A6D07"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:logo\\!_8_bm_firmware:1.82.01:*:*:*:*:*:*:*","matchCriteriaId":"6E096EF1-CCBA-4F81-BEED-963E43A60DB0"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:logo\\!_8_bm_firmware:1.82.02:*:*:*:*:*:*:*","matchCriteriaId":"F87E0DFC-2333-4AFB-8CF9-E34A73E3521E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:logo\\!_8_bm:-:*:*:*:*:*:*:*","matchCriteriaId":"59947FF6-3711-47C1-B91E-87DBF31DAF57"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-573753.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069","source":"productcert@siemens.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-573753.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}