{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:52:13.070","vulnerabilities":[{"cve":{"id":"CVE-2023-48428","sourceIdentifier":"productcert@siemens.com","published":"2023-12-12T12:15:14.873","lastModified":"2024-11-21T08:31:42.200","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The radius configuration mechanism of affected products does not correctly check uploaded certificates. A malicious admin could upload a crafted certificate resulting in a denial-of-service condition or potentially issue commands on system level."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en SINEC INS (Todas las versiones &lt; V1.0 SP2 Update 2). El mecanismo de configuración de radio de los productos afectados no verifica correctamente los certificados cargados. Un administrador malintencionado podría cargar un certificado manipulado, lo que provocaría una condición de denegación de servicio o podría emitir comandos a nivel del sistema."}],"metrics":{"cvssMetricV31":[{"source":"productcert@siemens.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0","matchCriteriaId":"C89891C1-DFD7-4E1F-80A9-7485D86A15B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*","matchCriteriaId":"4664B195-AF14-4834-82B3-0B2C98020EB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*","matchCriteriaId":"75BC588E-CDF0-404E-AD61-02093A1DF343"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*","matchCriteriaId":"A334F7B4-7283-4453-BAED-D2E01B7F8A6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*","matchCriteriaId":"A6BEA71C-CA81-4B5D-A688-2B21E62DC351"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}