{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Biograph mMR toutes versions sans le correctif de s\u00e9curit\u00e9 SecurityUpdate_SU28_F2 (SU28)","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"MAGNETOM MRI Systems toutes versions sans le correctif de s\u00e9curit\u00e9 SecurityUpdate_SU28_F2 (SU28)","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SOMATOM CT toutes les versions sans les correctifs ServPack41 ou ServPack42","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SOMATOM Force, Definition Edge, Definition Flash ou Definition/Definition AS family toutes les versions sans le correctif Som7_FP10","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SOMATOM Drive et Confidence toutes versions sans le correctif VA62A_FP10","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-0143","url":"https://www.cve.org/CVERecord?id=CVE-2017-0143"},{"name":"CVE-2017-0147","url":"https://www.cve.org/CVERecord?id=CVE-2017-0147"},{"name":"CVE-2017-0148","url":"https://www.cve.org/CVERecord?id=CVE-2017-0148"},{"name":"CVE-2017-0146","url":"https://www.cve.org/CVERecord?id=CVE-2017-0146"},{"name":"CVE-2017-0144","url":"https://www.cve.org/CVERecord?id=CVE-2017-0144"},{"name":"CVE-2017-0145","url":"https://www.cve.org/CVERecord?id=CVE-2017-0145"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 SSA-832636 du 26 mai 2017","url":"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-832636.pdf"},{"title":"Bulletin de s\u00e9curit\u00e9 SSA-408571 du 29 mai 2017","url":"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-408571.pdf"}],"reference":"CERTFR-2017-AVI-166","revisions":[{"description":"version initiale.","revision_date":"2017-05-29T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">SCADA les produits Siemens</span>. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-832636 du 26 mai 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-408571 du 29 mai 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-740012 du 26 mai 2017","url":"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-740012.pdf"}]}
